SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Android vs. iPhone
for Mobile Security
Operating Systems
iOS only runs on Apple hardware, and this
proprietary pairing has always helped
Apple tighten up their systems more than
open vendors. Android OS runs on many
different types of hardware, each with its
own security profile. A security-conscious
person may investigate this before buying
an Android, but most people would not.
There are more malware threats
written for Android devices
than iOS devices.
Data Wipe
iPhone offers the Erase Data feature,
which wipes the device after 10
consecutive unsuccessful passcode
attempts. Apps exist for Android devices
which can do the same thing, but Apple’s
integration of this security measure into
its operating system speaks to their
consideration of security as a primary
need and doesn’t rely on third party
developers to update or patch an app.
Malware Threats
There are more malware threats written
for Android devices than iOS devices. By
sheer quantity, iOS is less likely to have a
vulnerability. However, rare
vulnerabilities do exist for iOS and its
apps, and just one can wreak havoc if
successfully exploited.
App Security
Apple has always vetted the software it
allowed into its store fairly carefully
compared to Android, which improves
quality across the board. However, many
vulnerabilities occur through
misconfiguration or bad code and won’t
always be caught by a QA center
processing thousands of apps a day.
Versioning
Android OS is currently on version 6.0.1,
which was released in October of 2015. It’
s had regular updates about every year,
usually at a major version level. The latest
iOS version, 9.3.2 came out in May of this
year. Both teams regularly update their
product at the patch level and major
releases tend to coincide with hardware
cycles, almost yearly. Look for faster OS
releases as the need to adapt increases
with new technology.
CSTAR
Apple.com and Android.com both have
great external security presences, with
scores of 877. They take security seriously
on the perimeter and implement
common mechanisms to prevent
vulnerabilities.
Encryption
During the Apple/FBI encryption battle,
much was made about whether an
Android phone would have made any
difference. Google made it clear that their
open encryption, like Apple’s, prevents
even Google from snooping Android
devices. Both platforms use strong
encryption and both companies consider
user privacy a crucial business asset.
Much of Apple’s edge over Android for
security comes at a cost: Apple
gatekeeping what apps are available, the
proprietary relationship between
hardware and software, much more “black
boxed” to end users (unless jailbroken)
than other devices, and a high price tag
that immediately puts it out of reach for
many people. Their reputation for
innovation and being “elite” often puts
them in charge of the way people use their
phones to a greater extent than even a
more popular solution like Android.
Black Boxed
Android is crushing Apple
in the market and will
continue to do so for the
foreseeable future.
But to some extent comparing Android and Apple in this regard is misleading. Android OS is software, designed to run on
a multitude of compliant, but separate, hardware. iOS is both the software and the hardware of the iPhone. The two are
inseparable. This difference cannot be overstated and its ramifications are what truly separates Apple from other
computer corporations, for better and worse.
More malware
will continue to
target Android

Weitere Àhnliche Inhalte

Was ist angesagt?

ios vs android.ppt
ios vs android.pptios vs android.ppt
ios vs android.pptAbhishek suthar
 
Android vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsAndroid vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsDipesh Bhatiya
 
Android Vs iOS
Android Vs iOSAndroid Vs iOS
Android Vs iOSVaibhav Tomar
 
ios vs android presentation
ios vs android presentationios vs android presentation
ios vs android presentationsahibe alam
 
iOS vs. Android — In Numbers and Style
iOS vs. Android — In Numbers and StyleiOS vs. Android — In Numbers and Style
iOS vs. Android — In Numbers and StyleAndreas Kwiatkowski
 
Ios vs android
Ios vs androidIos vs android
Ios vs androidsumitvikram
 
Course overview 1
Course overview   1Course overview   1
Course overview 1Michael Shrove
 
iOS vs Android History
iOS vs Android HistoryiOS vs Android History
iOS vs Android HistoryClark Davidson
 
Windows 10 vs iOS 9 vs Android M: Clash Between 3 Most Efficient OS
Windows 10 vs iOS 9 vs Android M: Clash Between 3 Most Efficient OSWindows 10 vs iOS 9 vs Android M: Clash Between 3 Most Efficient OS
Windows 10 vs iOS 9 vs Android M: Clash Between 3 Most Efficient OSiMOBDEV Technologies Pvt. Ltd.
 
Android VS IOS VS Windows Phone
Android VS IOS VS Windows PhoneAndroid VS IOS VS Windows Phone
Android VS IOS VS Windows Phonerabbianasir99
 
Iphone vs android
Iphone vs androidIphone vs android
Iphone vs androidxomo
 
Android vs ios
Android vs iosAndroid vs ios
Android vs iosKeval Bhatt
 
Android vs iOS
Android vs iOSAndroid vs iOS
Android vs iOSManan Narang
 
Android VS IOS
Android VS IOSAndroid VS IOS
Android VS IOSAkash Awaskar
 
Android vs iOS
Android vs iOSAndroid vs iOS
Android vs iOSUmang Dhuri
 
Ios operating system
Ios operating systemIos operating system
Ios operating systemKhaja Moiz Uddin
 
Android and android phones
Android and android phonesAndroid and android phones
Android and android phonesabie01523
 

Was ist angesagt? (19)

ios vs android.ppt
ios vs android.pptios vs android.ppt
ios vs android.ppt
 
Android vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functionsAndroid vs. IOS: Comparing features & functions
Android vs. IOS: Comparing features & functions
 
Android Vs iOS
Android Vs iOSAndroid Vs iOS
Android Vs iOS
 
ios vs android presentation
ios vs android presentationios vs android presentation
ios vs android presentation
 
iOS vs. Android — In Numbers and Style
iOS vs. Android — In Numbers and StyleiOS vs. Android — In Numbers and Style
iOS vs. Android — In Numbers and Style
 
Ios vs android
Ios vs androidIos vs android
Ios vs android
 
Course overview 1
Course overview   1Course overview   1
Course overview 1
 
iOS vs Android History
iOS vs Android HistoryiOS vs Android History
iOS vs Android History
 
Windows 10 vs iOS 9 vs Android M: Clash Between 3 Most Efficient OS
Windows 10 vs iOS 9 vs Android M: Clash Between 3 Most Efficient OSWindows 10 vs iOS 9 vs Android M: Clash Between 3 Most Efficient OS
Windows 10 vs iOS 9 vs Android M: Clash Between 3 Most Efficient OS
 
Android vs iOS
Android vs iOSAndroid vs iOS
Android vs iOS
 
Android VS IOS VS Windows Phone
Android VS IOS VS Windows PhoneAndroid VS IOS VS Windows Phone
Android VS IOS VS Windows Phone
 
Iphone vs android
Iphone vs androidIphone vs android
Iphone vs android
 
Android vs ios
Android vs iosAndroid vs ios
Android vs ios
 
Android vs iOS
Android vs iOSAndroid vs iOS
Android vs iOS
 
Android vs iOS
Android vs iOSAndroid vs iOS
Android vs iOS
 
Android VS IOS
Android VS IOSAndroid VS IOS
Android VS IOS
 
Android vs iOS
Android vs iOSAndroid vs iOS
Android vs iOS
 
Ios operating system
Ios operating systemIos operating system
Ios operating system
 
Android and android phones
Android and android phonesAndroid and android phones
Android and android phones
 

Andere mochten auch

Android vs i os features
Android vs i os featuresAndroid vs i os features
Android vs i os featuresGuang Ying Yuan
 
EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...
EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...
EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...Pietro F. Maggi
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 
The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...Priyanka Aash
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0wendyking63
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And SecurityJames Wernicke
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarDenim Group
 
Mobile device security informative v2
Mobile device security   informative v2Mobile device security   informative v2
Mobile device security informative v2Salman Zahid
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Ajin Abraham
 
Android vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and DesignAndroid vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and DesignJeremy Johnson
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 

Andere mochten auch (17)

Android vs i os features
Android vs i os featuresAndroid vs i os features
Android vs i os features
 
EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...
EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...
EMEA AppForum 2015 Android KitKat & Lollipop - new features for enterprise de...
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
Ios seminar
Ios seminarIos seminar
Ios seminar
 
InfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and AndroidInfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and Android
 
The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And Security
 
Pitch
PitchPitch
Pitch
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
 
Mobile device security informative v2
Mobile device security   informative v2Mobile device security   informative v2
Mobile device security informative v2
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Android vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and DesignAndroid vs iPhone - Differences in UI Patterns and Design
Android vs iPhone - Differences in UI Patterns and Design
 
Mobile security
Mobile securityMobile security
Mobile security
 

Ähnlich wie Android vs. iPhone for Mobile Security

Comparing Security- iOS vs Android.pdf
Comparing Security- iOS vs Android.pdfComparing Security- iOS vs Android.pdf
Comparing Security- iOS vs Android.pdfTechugo
 
Android security
Android securityAndroid security
Android securityMidhun P Gopi
 
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Subho Halder
 
Write a scholarly review on the following topic. This assignment i
Write a scholarly review on the following topic. This assignment iWrite a scholarly review on the following topic. This assignment i
Write a scholarly review on the following topic. This assignment ilorindajamieson
 
Which mobile os should you choose while building
Which mobile os should you choose while buildingWhich mobile os should you choose while building
Which mobile os should you choose while buildingArpitGautam20
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Apple threat-landscape
Apple threat-landscapeApple threat-landscape
Apple threat-landscapeAndrey Apuhtin
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systemsDivya Raval
 
Android and iOS Platforms For E-Commerce App
Android and iOS Platforms For E-Commerce AppAndroid and iOS Platforms For E-Commerce App
Android and iOS Platforms For E-Commerce Appdigitalseller235
 
Android OS - Simple pres.
Android OS - Simple pres.Android OS - Simple pres.
Android OS - Simple pres.Meqdad Darweesh
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSubho Halder
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Smart phone security ios system
Smart phone security ios systemSmart phone security ios system
Smart phone security ios systemJamil S. Alagha
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application SecurityMarie Weaver
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 

Ähnlich wie Android vs. iPhone for Mobile Security (20)

Comparing Security- iOS vs Android.pdf
Comparing Security- iOS vs Android.pdfComparing Security- iOS vs Android.pdf
Comparing Security- iOS vs Android.pdf
 
Android security
Android securityAndroid security
Android security
 
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
Outsmarting Hackers before your App gets Hacked - iOS Conf SG 2016
 
Write a scholarly review on the following topic. This assignment i
Write a scholarly review on the following topic. This assignment iWrite a scholarly review on the following topic. This assignment i
Write a scholarly review on the following topic. This assignment i
 
Which mobile os should you choose while building
Which mobile os should you choose while buildingWhich mobile os should you choose while building
Which mobile os should you choose while building
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Apple threat-landscape
Apple threat-landscapeApple threat-landscape
Apple threat-landscape
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
Android and iOS Platforms For E-Commerce App
Android and iOS Platforms For E-Commerce AppAndroid and iOS Platforms For E-Commerce App
Android and iOS Platforms For E-Commerce App
 
Android OS - Simple pres.
Android OS - Simple pres.Android OS - Simple pres.
Android OS - Simple pres.
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Smart phone security ios system
Smart phone security ios systemSmart phone security ios system
Smart phone security ios system
 
Roberto Foglietta - Beyond Google & Apple duopoly
Roberto Foglietta - Beyond Google & Apple duopolyRoberto Foglietta - Beyond Google & Apple duopoly
Roberto Foglietta - Beyond Google & Apple duopoly
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 

Mehr von CloudCheckr

Top 10 Windows Vulnerabilities - Infographic
Top 10 Windows Vulnerabilities - InfographicTop 10 Windows Vulnerabilities - Infographic
Top 10 Windows Vulnerabilities - InfographicCloudCheckr
 
Top 10 Windows Ten Vulnerabilities - Infographic
Top 10 Windows Ten Vulnerabilities - InfographicTop 10 Windows Ten Vulnerabilities - Infographic
Top 10 Windows Ten Vulnerabilities - InfographicCloudCheckr
 
Top 10 Java Vulnerabilities & How to Fix Them - Infographic
Top 10 Java Vulnerabilities & How to Fix Them - InfographicTop 10 Java Vulnerabilities & How to Fix Them - Infographic
Top 10 Java Vulnerabilities & How to Fix Them - InfographicCloudCheckr
 
Top 10 critical CVEs that can lead to a data breach - Infographic
Top 10 critical CVEs that can lead to a data breach - InfographicTop 10 critical CVEs that can lead to a data breach - Infographic
Top 10 critical CVEs that can lead to a data breach - InfographicCloudCheckr
 
Top 20 OWASP vulnerabilities & how to fix them - Infographic
Top 20 OWASP vulnerabilities & how to fix them - Infographic Top 20 OWASP vulnerabilities & how to fix them - Infographic
Top 20 OWASP vulnerabilities & how to fix them - Infographic CloudCheckr
 
5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock
5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock
5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRockCloudCheckr
 
Enterprise DevOps and the Cloud
Enterprise DevOps and the CloudEnterprise DevOps and the Cloud
Enterprise DevOps and the CloudCloudCheckr
 
4 Prerequisites for DevOps Success
4 Prerequisites for DevOps Success4 Prerequisites for DevOps Success
4 Prerequisites for DevOps SuccessCloudCheckr
 
DevOps vs The Enterprise
DevOps vs The EnterpriseDevOps vs The Enterprise
DevOps vs The EnterpriseCloudCheckr
 
DevOps Days New York
DevOps Days New YorkDevOps Days New York
DevOps Days New YorkCloudCheckr
 
What if Enterprise IT Built Race Cars?
What if Enterprise IT Built Race Cars?What if Enterprise IT Built Race Cars?
What if Enterprise IT Built Race Cars?CloudCheckr
 
Techno Arms Dealers and High Frequency Traders
Techno Arms Dealers and High Frequency TradersTechno Arms Dealers and High Frequency Traders
Techno Arms Dealers and High Frequency TradersCloudCheckr
 
10 IT Automation Conferences to Attend
10 IT Automation Conferences to Attend10 IT Automation Conferences to Attend
10 IT Automation Conferences to AttendCloudCheckr
 
Puppet vs. Chef - The Battle Wages On
Puppet vs. Chef - The Battle Wages OnPuppet vs. Chef - The Battle Wages On
Puppet vs. Chef - The Battle Wages OnCloudCheckr
 
Welcome Our Robot Overlords
Welcome Our Robot OverlordsWelcome Our Robot Overlords
Welcome Our Robot OverlordsCloudCheckr
 
Top 5 CIO's of 2012
Top 5 CIO's of 2012Top 5 CIO's of 2012
Top 5 CIO's of 2012CloudCheckr
 
ScriptRock Robotics Testing
ScriptRock Robotics TestingScriptRock Robotics Testing
ScriptRock Robotics TestingCloudCheckr
 
ScriptRock Overview
ScriptRock OverviewScriptRock Overview
ScriptRock OverviewCloudCheckr
 

Mehr von CloudCheckr (18)

Top 10 Windows Vulnerabilities - Infographic
Top 10 Windows Vulnerabilities - InfographicTop 10 Windows Vulnerabilities - Infographic
Top 10 Windows Vulnerabilities - Infographic
 
Top 10 Windows Ten Vulnerabilities - Infographic
Top 10 Windows Ten Vulnerabilities - InfographicTop 10 Windows Ten Vulnerabilities - Infographic
Top 10 Windows Ten Vulnerabilities - Infographic
 
Top 10 Java Vulnerabilities & How to Fix Them - Infographic
Top 10 Java Vulnerabilities & How to Fix Them - InfographicTop 10 Java Vulnerabilities & How to Fix Them - Infographic
Top 10 Java Vulnerabilities & How to Fix Them - Infographic
 
Top 10 critical CVEs that can lead to a data breach - Infographic
Top 10 critical CVEs that can lead to a data breach - InfographicTop 10 critical CVEs that can lead to a data breach - Infographic
Top 10 critical CVEs that can lead to a data breach - Infographic
 
Top 20 OWASP vulnerabilities & how to fix them - Infographic
Top 20 OWASP vulnerabilities & how to fix them - Infographic Top 20 OWASP vulnerabilities & how to fix them - Infographic
Top 20 OWASP vulnerabilities & how to fix them - Infographic
 
5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock
5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock
5 Dysfunctions of a DevOps Team - Velocity Ignite 2014 - ScriptRock
 
Enterprise DevOps and the Cloud
Enterprise DevOps and the CloudEnterprise DevOps and the Cloud
Enterprise DevOps and the Cloud
 
4 Prerequisites for DevOps Success
4 Prerequisites for DevOps Success4 Prerequisites for DevOps Success
4 Prerequisites for DevOps Success
 
DevOps vs The Enterprise
DevOps vs The EnterpriseDevOps vs The Enterprise
DevOps vs The Enterprise
 
DevOps Days New York
DevOps Days New YorkDevOps Days New York
DevOps Days New York
 
What if Enterprise IT Built Race Cars?
What if Enterprise IT Built Race Cars?What if Enterprise IT Built Race Cars?
What if Enterprise IT Built Race Cars?
 
Techno Arms Dealers and High Frequency Traders
Techno Arms Dealers and High Frequency TradersTechno Arms Dealers and High Frequency Traders
Techno Arms Dealers and High Frequency Traders
 
10 IT Automation Conferences to Attend
10 IT Automation Conferences to Attend10 IT Automation Conferences to Attend
10 IT Automation Conferences to Attend
 
Puppet vs. Chef - The Battle Wages On
Puppet vs. Chef - The Battle Wages OnPuppet vs. Chef - The Battle Wages On
Puppet vs. Chef - The Battle Wages On
 
Welcome Our Robot Overlords
Welcome Our Robot OverlordsWelcome Our Robot Overlords
Welcome Our Robot Overlords
 
Top 5 CIO's of 2012
Top 5 CIO's of 2012Top 5 CIO's of 2012
Top 5 CIO's of 2012
 
ScriptRock Robotics Testing
ScriptRock Robotics TestingScriptRock Robotics Testing
ScriptRock Robotics Testing
 
ScriptRock Overview
ScriptRock OverviewScriptRock Overview
ScriptRock Overview
 

KĂŒrzlich hochgeladen

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

KĂŒrzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Android vs. iPhone for Mobile Security

  • 1. Android vs. iPhone for Mobile Security
  • 2. Operating Systems iOS only runs on Apple hardware, and this proprietary pairing has always helped Apple tighten up their systems more than open vendors. Android OS runs on many different types of hardware, each with its own security profile. A security-conscious person may investigate this before buying an Android, but most people would not.
  • 3. There are more malware threats written for Android devices than iOS devices.
  • 4. Data Wipe iPhone offers the Erase Data feature, which wipes the device after 10 consecutive unsuccessful passcode attempts. Apps exist for Android devices which can do the same thing, but Apple’s integration of this security measure into its operating system speaks to their consideration of security as a primary need and doesn’t rely on third party developers to update or patch an app.
  • 5. Malware Threats There are more malware threats written for Android devices than iOS devices. By sheer quantity, iOS is less likely to have a vulnerability. However, rare vulnerabilities do exist for iOS and its apps, and just one can wreak havoc if successfully exploited.
  • 6. App Security Apple has always vetted the software it allowed into its store fairly carefully compared to Android, which improves quality across the board. However, many vulnerabilities occur through misconfiguration or bad code and won’t always be caught by a QA center processing thousands of apps a day.
  • 7. Versioning Android OS is currently on version 6.0.1, which was released in October of 2015. It’ s had regular updates about every year, usually at a major version level. The latest iOS version, 9.3.2 came out in May of this year. Both teams regularly update their product at the patch level and major releases tend to coincide with hardware cycles, almost yearly. Look for faster OS releases as the need to adapt increases with new technology.
  • 8. CSTAR Apple.com and Android.com both have great external security presences, with scores of 877. They take security seriously on the perimeter and implement common mechanisms to prevent vulnerabilities.
  • 9. Encryption During the Apple/FBI encryption battle, much was made about whether an Android phone would have made any difference. Google made it clear that their open encryption, like Apple’s, prevents even Google from snooping Android devices. Both platforms use strong encryption and both companies consider user privacy a crucial business asset.
  • 10. Much of Apple’s edge over Android for security comes at a cost: Apple gatekeeping what apps are available, the proprietary relationship between hardware and software, much more “black boxed” to end users (unless jailbroken) than other devices, and a high price tag that immediately puts it out of reach for many people. Their reputation for innovation and being “elite” often puts them in charge of the way people use their phones to a greater extent than even a more popular solution like Android. Black Boxed
  • 11. Android is crushing Apple in the market and will continue to do so for the foreseeable future.
  • 12. But to some extent comparing Android and Apple in this regard is misleading. Android OS is software, designed to run on a multitude of compliant, but separate, hardware. iOS is both the software and the hardware of the iPhone. The two are inseparable. This difference cannot be overstated and its ramifications are what truly separates Apple from other computer corporations, for better and worse. More malware will continue to target Android