preview

Similarities Between Android And Android

Decent Essays

Mobile devices like smart phones and tablets are what is most in demand right now in these times. They are basic working tools that meet with many more features than traditional phone. When technology advances quickly they are generating concerns such as security and privacy. Users need to be aware that there are certain threats like viruses and malware, just ask if you can see the Smartphone are safe. I will show an analysis of two operating systems that are currently the most widely used here: Android and iOS.

Application Permissions

When applications are installed it must have a restrictive permit control, as the developer of the application can access things that are not necessary in device. The user must know the amount of services …show more content…

Applications are distributed without control. The user has the responsibility to decide whether or not they should install an application.

Transparency

The availability of application source code affects the security of the device. When the platform is open source everybody can play with the code, the good thing is that experts can discover this vulnerability and find solutions to improve them.

IOS. It is a closed platform, troubleshooting is slower therefore, access to the code only limited to number of people.

Android. Platform and open source code base for the platform it is enabled for anyone who needs to experiment understand and use the code. Thanks to this, the vulnerability can be detected very fast. Users make an important role in the proper development of the platform.

Programming language

The programming language used to develop an application not only affects the performance of the application.

IOS- IOS applications are written in Objective-C language programming. Applications are linked to the C language libraries and this can cause problems even in programs that are "safe". In C, it is normal to use features for handling characters "str cat "that may favor for a buffer overflow attack and thereby cause a risk to store

Get Access