RPAPER (Edi) (1 1)
RPAPER (Edi) (1 1)
1 Department of Computer Science and Engineering, Lovely Professional University, Phagwara 144411, Punjab, India
Abstract:
With the widespread use of smartphones, user privacy issues in the Android and iOS ecosystems have also attracted much attention.
Although many studies have examined privacy issues in the Android and Google Play app ecosystems, little attention has been paid to iOS
and the Apple App Store, which is the leader in the US market. Additionally, as competition for privacy intensifies among these service
providers, understanding their privacy becomes even more important. This study looks at the privacy of 24,000 Android and iOS apps as
of 2020 and explores various dimensions related to user privacy. Studies have highlighted the importance of security in mobile operating
systems like Android and iOS (Aron & Hanacek, 2015). Vulnerability analyses have been performed on Android applications to detect
security risks and mitigate potential threats. Furthermore, the usability security risks of in-app browsing interfaces in both Android and
iOS apps have been investigated, emphasizing the need for well-designed interfaces to prevent security breaches. The findings reveal
widespread practices of third-party tracking and sharing of user-specific identifiers across both ecosystems, even extending to targeted
applications. Although iOS apps categorized as aimed at kids engage in fewer tracking ads than Android apps, they do access children's
location data more frequently.
Keywords:
1.Introduction
An operating system (OS) is the software that manages and controls computer hardware, hardware peripherals, and software
resources and users. It also provides a platform and support for applications and serves as an interface between computer users (such
as programmers) and computer hardware. Software applications, such as word processors, spreadsheets, databases, and other
specialized applications needed by businesses, run on a specific operating system platform. The operating system provides service
standards for processing uses such as storage, recording, scheduling, and other operations. It also provides a programming
environment that allows users to write and execute tasks easily and efficiently. Mobile devices have become an integral part of our
daily lives, and the security of these devices is of utmost importance. With the increasing popularity of smartphones and tablets, the
two dominant operating systems, iOS and Android, have become the focus of many security analyses. The paper will examine the
key security features of both operating systems, including their security architectures, and highlight the differences between them.
Additionally, the paper will explore the vulnerabilities commonly found in both iOS and Android, and provide insights into how
these vulnerabilities can be exploited.
1.1.1 ANDROID
The Android mobile operating system has been the standard OS for smartphones and tablets for nearly 15 years. Furthermore,
Android applications are by other operating systems like Windows 11 and Chrome OS without any issues. This adaptable operating
system, which is owned by Google, is built around a Linux kernel and is primarily intended for gadgets like tablets and smartphones.
The majority of devices run Google's customised Android version, which includes extra closed-source software like Google Mobile
Services (GMS), even though the core Android Open-Source Project (AOSP) is still free and open-source. It is most used OS now
days[1].
1.1.2 IOS
Ios is Apple’s Operating System. That was customized by apple.inc for iPad and iPhone specially. Later extended its expertise in
fields of laptops by introducing MacOS. Ios uses multi touch interface and is quite different from android os. Ios offers end to end
encrypted security and introduced touch id first in 2007 later making it more secure by creating one of the best security features i.e
Faceid . Apps are designed differently for IOS users.
The security architectures of iOS and Android differ significantly, as they each operate within their own unique environment. iOS's
closed ecosystem tightly controls device security, whereas Android's open-source code allows flexibility but increases the need for
security vigilance. The closed nature of iOS makes it more difficult for hackers to find vulnerabilities on iOS-powered devices,
which is not the case for Android devices. This is because Android is an open-source platform that may have fewer security protocols
and controls, which makes it more vulnerable to attacks [4][3]. Despite their differences, both iOS and Android have faced security
challenges and have been targeted by malware and cybercriminals [4]. The differing security approaches of iOS and Android often
divide IT departments on which serves enterprise needs better. Therefore, companies need to weigh the iOS vs. Android security
features alongside their specific requirements to address the unique challenges each platform presents [4]. While both iOS and
Android work diligently to fix security vulnerabilities through updates, the efficiency of their approaches is significantly influenced
by their ecosystems' structures. The decentralized nature of Android can lead to inconsistencies in its update cycle, whereas iOS has
a more centralized system for data surveillance compared to Android. Timely updates are essential for maintaining robust mobile
security, and both iOS and Android work towards this goal [4][3]. A comprehensive mobile strategy that aligns with their security
policies is the key to addressing the unique challenges each platform presents.
2. LITERATURE REVIEW
In recent years different studies and comparisons on IOS and Android operating systems have been performed. In this section, a
summary of existing works is provided.
Quissanga [1] examines the information security landscape in two prominent mobile operating systems: The Android and iOS are
the TWO mobile platforms that are widely used by the users. In the report, qualitative analyses have been made and the results have
been elaborated in reference to the data provided by Google Academic and CAPES. Thus the analysis gives an understanding of not
only the security risks themselves, but also how they operate on platforms. In spite of that fact that assaults with exactly size of
devices targeted may be increasing and they seem to be most prominent on Android platforms, it is an iOS that presents profound
level of safety, with the minimum chance of any kind of problems. Even though security practices provide prevention, detection,
and corrective approaches to be done by the authentication, encryption, and adequately setup of the network, security threats can
still result. Further, the study recommends heightened security education sessions for users to risk disclosure of passwords, social
engineering and also software that infects. The trust and culture of user awareness being cultivated is expected to engage users in
protecting sensitive information themselves and, therefore, lower the overall possibility of loss without going deep per this current
wave of digital integration. By making a point much like many other papers on mobile device security, some related but also a new
area of focus now emerges which is trends of the threats and behaviour patterns of users in this sphere that constantly evolves.
Mohamed [2] said that, computer security can be named one of the most topical issues in the era of the growing perspectives offered
by mobile devices for the personal and business use. While hackers keep going to undermine the defence of their victim
organizations, it does not only remain that gadgets are increasingly penetrating our activities, but the rare opportunities of successful
breaches continue to be reported from different places. The choice of vendors to make available mobile brands has increased that
will certainly add to the security of the designs. Whether their installation will be in favour or disgrace is not an easy task to predict
as it divides the community into two groups of people. The purpose of this study then is to identify several aspects that cause these
platforms to become more unsafe, for instance, the adoption of Android and iOS. Hence, it clearly talks about the features it offers
like the process through which the program was developed, type of access control, compartmentalization, and the types of encryption
it uses. Through integrating these elements together in a laconic yet authentic assessment of mobile security, the report aims to bring
clarity and new insights into the area of this research. While the development in the field of surveillance and the stronger security
mechanisms is spotted, this is also the strategy safeguarded.
Jain [3], observed that Android's widespread popularity is accompanied by a pressing concern: national safety. The importance of
implementing actual safeguards against the potential risk with big numbers, keeping in mind that Android users are huge cannot be
overstated. All third-party apps crave resources, and the android permission system is the arbitrator which grants an access rights
pass that enables them to utilize your device's hardware. Hardly do the alternative systems live up to the designation of "silent" as
they are based on "All or nothing" rule, and it means that the onus is on the users to allow or deny the permissions while installing
apps. Sadly though, most of them ignore or don't understand the implications as they granted those permission and actually allowed
the application to access unnecessary information. This jeopardy in case of other agents knowing about the entities' communication
increases the chances of attackers using various tools to get access to the devices via increased permission. As a result, there will be
a treasure trove of information for an aggressor, for instance user privacy might be compromised and secret information could be
extracted. This paper in-depth study the permission failed attack, illustrating how the loopholes in the Android's permission based
model can be used by hackers. Also, it erases the concern by outlining an app which depicts how even one unchecked permission
may lead to grave violations of personal privacy for the users. This presentation elaborates on the dangers of these security holes
and shows practical examples on how such problems could be avoided by users. The overall idea conveyed is that of increased
knowledge and preventive measures against malicious threats.
Susanto [4], studied the current SMD OS, an interview was being performed in the online mode that revealed that user preferences,
technological advancements, and security has dynamic landscape like vegetation. The research was mostly done on iOS and Android
version only because they have a 99% or more market share of the mobile operating system (OS). Studies on these devices involve
a comparison of their ability to perform and the security measures employed. The SMD prospect of getting the perception given by
Gen Y member is indeed reminds one that knowing the people's stance is very important considering that this generation is familiar
with digital and oftentimes engages in online functions. Besides the country of Brunei, the other aspect of research which also poses
a lot of relevancies is the regional aspect such as finding out the current consumption habits in the areas and how do they perceive
these preferences. Dynamic events OS security investigations exhibit clear battles with explosions of the data breaches and the
breaches while on the contrary they set up innovations of technology towards the OSs which must require progress in that side. This
literature review provide holistically biased and give clear insight into the effects of shared decision making between suppliers and
customers on security risk and product choices by simply reviewing the material of different authoritative sources literatures.
Sahani [5] dives into integrating the app frameworks in which the provenance (where the individual applications come from),
permission vectors (ways into which permissions or third party elements can be introduced to applications), compartmentalization
(specific processes to come up with viable solutions to malicious activity) and the existing encryption techniques (different methods
of encryption that preserve security) are addressed, respectively. The paper also outlines Android and iOS platforms security models
by explaining their architectures and building protocols. This talk will be about the platform and the Operating System of Android.
It will discuss the security aspects of the platform and the Development Platform. Android SDK, emulator, Eclipse IDE, Java
Development Kits and JRE being the integral part of the mechanism, they are the ones that complete it. Subsequently, to make a
comparison between iOS malware attacks and the security mechanisms that are in place in iPhones and looks at the techniques that
are used in the said attacks. While the topics of security matters are detailed for the platforms Android and iOS in the subsequent
sections, this paper aims to share ideas that will be helpful in understanding the security of the platforms and as well the platforms
themselves.
Ahmad [6], examines the security functions of an Android operating system and an iOS mobile operating system, in particular
touch upon certain aspects such as application sandboxing, memory randomization, encryption, data storage formats and run built-
in antivirus. On one hand, it covers the specified topic only to a great extent but is not completely profound, there is not enough
evidence and structure. The initial section lacks the historical perspective and serves the purpose to familiarize the reader with
mobile OS security. The structure can be enhanced by adding a chapter for each security feature. Furthermore, the document can be
raised to a higher level by having a more detailed breakdown of the strengths and weaknesses of each OS's security setup and a
standard of evidence to verify its assertions. For example, the paper can be more intrigued by outlining exactly what the end should
be after an analysis of the presented facts followed by some recommendations for both the users and the developers. At last, certain
sentences are also revised, or for better readability, eat. Generally, the solutions to these weaknesses will ensure that the paper serves
a more whole and educative part, that enables security distinction between Android and iOS.
Niyati Baliyan [7] performed a comparative analysis of Android, and iOS, from 2015-2019 considering the security sides. Applying
the CIA security triad to this software, it examines architecture, security models, encryption, app permissions, and so on. Android
looks like it has relatively frequent security vulnerabilities and malware, as opposed to iOS. Android dominates the markets and the
user's population emphasizes its importance in the telecommunication process. A part of the core contributions is a vulnerability
analysis followed by a discussion of open research questions and finally an outlook for academics and developers. The document is
organized into sections which these include: the past security tactics, trends in the vulnerability of networks, and the types of
malware attacks. The paper emphasizes the importance of solutions to the security issues in mind, notably those pertaining to the
Android platform, to ensure that users stay safe and meet the ever-evolving demands of mobile operating systems.
Gyorödi [8] , presented examination of several essential aspects that are frequently used in the creation of mobile applications, such
as fundamental network connectivity, screen element rendering, and asynchronous multi-threaded code execution. Through the
creation of functionally identical applications for both iOS and Android, the study attempts to analyze and contrast these features'
performance metrics on both platforms. By using the programming languages and tools that are suggested for each operating system,
the study aims to clarify the differences between iOS and Android. The results are meant to provide guidance and information for
optimizing application development procedures that are specific to each platform.
Al-Qershi [9], concentrates on how the leading smartphones operating systems, iOS and Android, which are the Apple’s software
and Google’s platform version, respectively. The paper puts across the importance of smartphones in modern tech driven world.
Smartphone enables any person to easily convey his/her message to large number of clients irrespective of their location. It stores
confidential data and make them the prime target for cyber-attacks. It also digs into the types of threats and malware that target the
two platforms including the multiple vulnerabilities they are susceptible to and how other manner of compromises and attacks that
aim to exploit these networks can come in play. Lastly, it compares iOS and Android based on many different security criteria
seeking to answer the question of which operating system is more secure. Such comparison probably takes into consideration among
imparting data on their robust security mechanism, regularity of their security update, the work they do with vetting app stores
customer along with their handling of user privacy.
Wukkadada [10] compared Android based kernel system and IOS kernel system .Android uses the same kernel as is used by the
Linux OS for its kernel, thus in terms of customization and versatility, Android is like a king because it can be adapted to fit in
almost any of the devices available. Its open sourcing attribute inspire community members' contributions while it is also help to
speed up the rate of innovations as well. Nevertheless, such an openness has its security issues by the possibility of the fragmentation
that can result in the security updates not becoming available as fast as they would have in a more unified operation system
ecosystem. On the one hand , the iOS access nucleus is based on the Darwin kernel ( it is a Unix - system - based system), Apple
hardware and software ecosystem being tightly connected . The implementation allows for the performance without a break and
efficient resource management. To Apple's advantage is the fact that iOS is completely made within the company, starting with the
hardware up to the software, thus providing a more unified and zippy experience and concluded that Android's kernel is more
flexible and open while iOS's kernel provides tighter integration with the additional of Apple's closed ecosystem approach in such
the matter that one provides greater opportunities and the other emphasizes rigidness with careful security controls. The fact that
the choice will be made between the two is more a matter of user preference for these matters as it touches on security, customization,
and ecosystem-integration.
Vulnerabilities in mobile operating systems are a common target for cyberthieves and can lead to severe consequences. Both iOS
and Android operating systems have vulnerabilities that hackers can exploit to gain access to personal information of users [1][3].
Android has more devices on the market, which increases the risk of hacking attacks [3]. Standardized hardware features in most
android devices can also create a layer of vulnerability [3]. In addition, manufacturers often customize the base platform, which can
create secondary layers of vulnerability [3]. Android's global popularity makes it a more attractive target for cybercriminals [1].
Android devices are more susceptible to viruses and malware, whilst the operating system is more often targeted by hackers [1].
iPhones and Androids can both be hacked, but Apple's tight control over the app store limits the number of vulnerabilities that arise
[3]. Jailbreaking or rooting Android devices can bypass built-in security protocols, which can unlock more features or functionality
but also increases the risk of attack [3]. Although no specific vulnerabilities are mentioned, the article reviews the various security
features and threats faced by both iOS and Android operating systems, concluding that when attacks do happen, they tend to be
quite serious. The comparative analysis of security features and vulnerabilities between iOS and Android operating systems has
shed light on important differences that exist between the two platforms. While both iOS and Android have several security features
designed to protect user data, Android's open-source nature allows for more customization options, which also introduces more
security risks. As a result, Android devices require more user effort to maintain their security compared to iOS devices. Despite
iOS's closed system and stringent security protocols, its level of market penetration makes it an attractive target for cybercriminals.
On the other hand, Android devices are more susceptible to viruses and malware, whilst the operating system is more often targeted
by hackers. This study fouund that iOS is known for its strong security features, including a strict app review process and hardware
encryption, while standardized hardware features in most Android devices can also create a layer of vulnerability.
The security architectures of iOS and Android differ significantly, as they each operate within their own unique environment. iOS's
closed ecosystem tightly controls device security, whereas Android's open-source code allows flexibility but increases the need for
security vigilance [4]. The closed nature of iOS makes it more difficult for hackers to find vulnerabilities on iOS-powered devices,
which is not the case for Android devices. This is because Android is an open-source platform that may have fewer security protocols
and controls, which makes it more vulnerable to attacks [4][3]. Despite their differences, both iOS and Android have faced security
challenges and have been targeted by malware and cybercriminals [4]. The differing security approaches of iOS and Android often
divide IT departments on which serves enterprise needs better. Therefore, companies need to weigh the iOS vs. Android security
features alongside their specific requirements to address the unique challenges each platform presents [4]. While both iOS and
Android work diligently to fix security vulnerabilities through updates, the efficiency of their approaches is significantly influenced
by their ecosystems' structures. The decentralized nature of Android can lead to inconsistencies in its update cycle, whereas iOS has
a more centralized system for data surveillance compared to Android. Timely updates are essential for maintaining robust mobile
security, and both iOS and Android work towards this goal [4][3]. A comprehensive mobile strategy that aligns with their security
policies is the key to addressing the unique challenges each platform presents.
Application
Unique ID
Access
Rules
App
App Files
Database
The land owned by Apple, the OS of the iOS (which is a closed OS unlike Android), is different from the open-source system of
Android . Instead of other developers who might create an app for only Apple and iOS, Apple ecosystem is unfortunately not public
like other software companies. Closed framework of iOS operating systems does not give the users ample freedom to break/change
it which Android users have more leverage to violate large portion of the system. Apple monitor too often, iTunes Store users who
surmount barriers that prevents them from accessing softwares while there is evidence that the company can act against people who
act against the rules by jailbreaking their devices. Using a one-dimension score point, iOS devices are given a strict superiority and
a much more closed system which is in total. This system is more open. Apple sets a security profile for iOS that cannot be modified
at a primitive level thus moving around with the in-built security which users are unaware that they cannot disable any of those
security provisions. Through this, these mechanisms may be made to get an equal footing they need to work together, and so
operations will run smoothly paving way for enduring performance. The Touch ID of iOS is already a well-known security upgrade.
It is a biometric authentication, for example a fingerprint that one can use to unlock the device and to pay for some apps or services.
Nevertheless, iOS shipment is done in closed-form which gives Apple the opportunity to have some default capabilities that are
ideally advertisable and which are designed in such a way that the end user can operate them without having to use super complicated
settings.Among the major merits of iOS having the specific hardware-software model is that Apple may establish its own security
policies without any changes to conform to how the users prefer their devices, this also gives the iOS users select their security
policies as unlike Android where the ownership is shared among users and these security policies are not mandatory since privacy
is one of the important features in Android. The type of looking at the fundamental philosophical diversity of two mobile operating
systems, this critical thinking process displays the metaphorical equivalent of the balancing act between the customer’s freedom
and security.
OS Android iOS
Manufacturer Open source OS designed & Apple Inc. closed, with components that are source
developed by Android Inc. Google is openly.
now the current owner.
Development and OHA(Open Handset Alliance) Apple Inc. developed and distributed iOS.
Distribution
Computer Architecture Android-x86 powered by AMD and ARM
Supported Intelx86 processors.
Target System Type Consumer, Enterprise, education Smartphone, music system player, Tablet
system/computer.
User Friendly for Lay Very User Friendly Very User Friendly
Users
Integrated Firewall iptables Firewall-IP for iOS
5. CONCLUSION
In this respect, when it comes to comparing iOS and Android OS, the problem becomes more difficult to solve because the two
software versions stand for the two diametrically opposed security concepts and include a number of both advantages and
drawbacks. Here, one could refer to the Apple software that is embedded in the iOS system, which is controlled by the Apple
corporation itself and thus strives to provide both hardware and software with integral deep support. Being average, the result is a
better security “out-of-the-box” as per the customers. Apple ecosystem that is being tightly controlled The apps must be singly
approved to be sold in the App Store curated by Apple, the sites default on security features, and these gears are so well hidden that
the users are never obliged to reconfigure privacy settings. Apple will achieve this goal by the implementation of a system that will
allow it to have full control and security of the users’ experience. However, the mentioned advantage is still an exchange rate, which
allows to set those settings oneself. The first and the most important benefit is that Android is open-source and it allows users to
install apps from third-party sources which, in turn, consequently becomes wide non-standard choice; on the other hand, this scenario
is very risky since there is no guarantee that all applications are affected by malware and security flaws if they are not well managed.
Android if introduced to address safety preoccupation through containment, encryption and upgrade, but final user still bears the
consequences of his or her internet surfing patterns and the way to get it ensured is by mindful app retrieval. It follows therefore
that in several cases a balance has to be struck between enhancement of security and convenience of custom designs on the one
hand and providing for the easiness of using the default model on the other hand. But it can lead to slipping into serving to a quarter
of consumers, who want comfort and efficiency over individualization. Despite the difference on the extreme ends of the users,
Android is a bit more approachable and equally flexible which needs to be very vigilant while iOS in particular downgrades the
standards by presenting the small-scale choices after compromising a certain level of security. Besides, Android will stand up to
security threats in a stricter way and it will be more likely to resist them by using application obfuscation, but it might keep its open-
minded character. In general, the security models of the two operating systems are real cases of use, containing a diversification of
security models, which is an interesting choice for some users while posing a risk for others. The truth however is, that finding a
stable balance between security, privacy and functionality is a periodic exercise and one that mobile OS developers always have to
struggle with. This review paper aims to conduct a comparative analysis of the security features and vulnerabilities of iOS and
Android operating systems. The findings of this research will be valuable to mobile device users, security practitioners, and
researchers who seek to understand the security landscape of iOS and Android operating systems.
6. REFERENCES
[1] Quissanga, Fernando. (2023). Comparative Study of Information Security in Mobile Operating Systems: Android and Apple
iOS. 10.5772/intechopen.109652.
[2] Mohamed, I., & Patel, D. (2015, April). Android vs iOS security: A comparative study. In 2015 12th international conference
on information technology-new generations (pp. 725-730). IEEE.
[3] A. Jain and Prachi, "Android security: Permission based attacks," 2016 3rd International Conference on Computing for
Sustainable Global Development (INDIACom), New Delhi, India, 2016, pp. 2754-2759.
[4] Susanto, Heru, et al. "Android vs iOS or Others? SMD-OS security issues: generation y perception." International Journal of
Technology Diffusion (IJTD) 7.2 (2016): 1-18.
[5] Sahani, A. (2017). Android v/s ios – the unceasing battle. International Journal of Computer Applications,
[6] Ahmad, Mohd Shahdi, et al. "Comparison between android and iOS Operating System in terms of security." 2013 8th
International Conference on Information Technology in Asia (CITA). IEEE, 2013.
[7] Garg, Shivi, and Niyati Baliyan. "Comparative analysis of Android and iOS from security viewpoint." Computer Science
Review 40 (2021): 100372.
[8] Gyorödi, Robert, et al. "A comparative study between applications developed for Android and iOS." International Journal of
Advanced Computer Science and Applications 8.11 (2017).
[9] Al-Qershi, Fattoh, et al. "Android vs. iOS: The security battle." 2014 World Congress on Computer Applications and Information
Systems (WCCAIS). IEEE, 2014.
[10] Wukkadada, Bharati, Ramith Nambiar, and Amala Nair. "Mobile operating system: Analysis and comparison of Android and
iOS." International Journal of Computing and Technology 2.7 (2015): 273-276.
Mar 25, 2024
Page 1 of 3
closed nature of iOS makes it more difficult for hackers to find vulnerabilities
on iOS-powered devices, which is not the case for Android devices. This is
because Android is an open-source platform that may have fewer security
protocols and controls, which makes it more vulnerable to attacks [4][3].
Despite their differences, both iOS and Android have faced security
challenges and have been targeted by malware and cybercriminals [4]. The
differing security approaches of iOS and Android often divide IT departments
on which serves enterprise needs better. Therefore, companies need to weigh
the iOS vs. Android security features alongside their specific requirements to
address the unique challenges each platform presents [4]. While both iOS
and Android work diligently to fix security vulnerabilities through updates, the
efficiency of their approaches is significantly influenced by their ecosystems'
structures. The decentralized nature of Android can lead to inconsistencies in
its update cycle, whereas iOS has a more centralized system for data
surveillance compared to Android. Timely updates are essential for
maintaining robust mobile security, and both iOS and Android work towards
this goal [4][3]. A comprehensive mobile strategy that aligns with their
security policies is the key to addressing the unique challenges each platform
presents. 4.1 ANDROID SECURITYARCHITECTURE The Android is the open-
source operating system. It has been equipped with Apache License whose
source code is under the described premise for no restrictions regarding the
programming problem’s purpose. A key issue is that apps that are used by
many people of Android will have to be encrypted. Android security model is
released based on its Linux kernel. User departments are ensured and access
to users' resources is prevented so that other users' experiences are not
affected by a negative action. It is especially valuable during Android
introduction that it is used to add the social function while keeping the user
privacy and security kept. Another important security feature is the caller
distinct from the app with restricted admittance to system. Privilege
management module attained to provision fine-grained access control
through roles and permissions where each app only sees the components
which it is given the right to use through the module.Android follows this
pattern of a permission model that outlines the areas that data and system
resources that the app can have access to. Temporarily reverting a file to an
older version is granted to any user under normal status. As for dangerous
status, permissions for as many files as necessary are reverted. Ordinary set of
permissions include all the basic operations making it possible for one to
access internet and set the time zone. Third toxic permission threats include
apps that have access to the more sensitive data or the fact that they can
read contacts or send SMS messages. After the apps are installed, the users
are prompted on whether to accept or deny permissions, which are being
requested. The customers will also be able to go back and reconsider their
permissions long after they have installed the application if so wish. This
permission model allows people to choose whether app could use data and
skill as much as it wants so that risk of privacy and security is lower than those
applications that are too open. Ultimately, Android's security architecture is
meant to be a barrier against the smudging of these lines to ensure the
Page 2 of 3
isolation of software, data and system assets, while giving the user an
unveiled and straightforward overview of the permissions that the apps have
access to, in order to keep malicious apps from breaching the users'
information or phones illegitimately.
Sources
2% Plagiarized
This makes it more difficult for hackers to find vulnerabilities on iOS-powered
devices.
https://us.norton.com/blog/mobile/android-vs-ios-which-is-more-secure
2% Plagiarized
Centralized vs decentralized mobile application portals
https://stackoverflow.com/questions/31706528/centralized-vs-
decentralized-mobile-application-portals
Page 3 of 3