StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Developments in IOS in Recent Times - Case Study Example

Cite this document
Summary
From the paper "Security Developments in IOS in Recent Times" it is clear that with the advancements coming in from each operating system trying to outsmart the other rival through the introduction of the more specialized techniques and features, the gainer is the end-user at the end of the day…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Security Developments in IOS in Recent Times
Read Text Preview

Extract of sample "Security Developments in IOS in Recent Times"

Introduction: The modern times are driven by the presence of the digital devices. These digital devices are run and controlled by the operating systems. The operating systems serve as the backbone and the heart of the any digital device. Our computers, our mobile phones, and other digital devices that are sufficiently equipped to provide us with various advanced features are as a result of the operating systems within them. Based on the features, there are number of top operating system providers in this world. These operating systems are supported by the giants of the electronic companies. The likes of Microsoft, Apple Inc, UNIX, and Google are few of the owners and pioneers who administer over the operating systems that are currently in the market. Most common Operating systems: In the category of mobile phone devices the most common operating systems are Apple I.O.S, Android supported by Google, and Windows Mobile operating system supported by Microsoft, Symbian operating systems that have been in the market for quite some time. They are supported by Nokia Inc. Blackberry is not behind in this category and they have their own operating system dedicated to it as well. Their operating system comes in form of R.I.M operating system. Each of these has its own characteristic features that makes each unique in its own way. Hardware function compatibility: I.O.S: In the aforementioned operating systems, some of these operating systems are hardware specific, while others are compatible with any kind of hardware device; I.O.S is one of them that requires Apple devices in support for the software. I.O.S are subject to the presence and requirement of Macintosh computers that support Mac OS X 10.6. I.O.S is the patented operating system of Apple Inc. in the case of the different operating systems. The very first of the many SDKs that were introduced by Apple Inc was NeXT O.S. Android Operating systems in contrast are relatively supportive and enjoy large scale compatibility scale in comparison to I.O.S. They are compatible with any kind of devices that may support ordinary operating systems and their kernels. The feature of creation of Android Virtual Devices is another aided feature that comes in the support of Android Operating system as compared to the I.O.S. A.V.D gives Android operating system an edge over its rivals. It allows for the pilot test and other verifications of the system compatibility and the applications proper functioning (Goadrich & Rogers, 2011). Security developments in I.O.S in recent times: In recent times, I.O.S has incorporated new and developed means of protecting the operating system from any kind of intruders. A step towards this process was taken in the I.O.S 4.3 version. It was taken through the incorporation of the A.S.L.R (Address Space Layout Randomization). Number of operating systems have been left wanting towards the incorporation of A.S.L.R in totality in past which have made them more prone to attacks (Zovi, 2011). Other similar schemes: To make the I.O.S virtually protective against all kinds of vulnerabilities, Mandatory Code Signing is another added feature that has been added to the operating system arsenal in recent times. Sandboxing is another aided feature that provides I.O.S an edge over its compatriot operating systems. It allows for keeping the applications code separate from one another. The issue of the Third Party request handling is also taken care of by I.O.S in a more effective manner. Special sub directories are assigned to it which makes it possible and easy to handle the request and applications in their own category (Addison, Nugent, & Manning, 2014, p. 71). Coding schemes: Both the major operating systems, Android and I.O.S use state of the art technologies with regard to the coding schemes. I.O.S makes use of the Xcode for the application writing process. For the purpose of writing and handling with the more demanding and more advanced requirements with regard to the protection and security of the clients, I.O.S uses applications such as Instrument to provide higher security and safety. Developmental progress: With regard to the progress made over the number of versions brought about, Android is front runner in this category as well. Although Apple Inc and I.O.S has been in the field for a far longer period than has been Android, yet Android has come up with more numbers of versions in the shorter span of over eight to nine years. Starting with its initial version of Version 1.0, it at present stands at 4.2 version. The rapid changes allow for more improvement and more chances of experimentation with the hardware and software applications in a combined manner. G.U.I Support: In the case of Android Graphic User interface, it is the XML files extension that makes the G.U.I brighter and effective. Eclipse is as a result of the same G.U.I incorporated. The use of editors such as WYSIWYG and DroidDraw are the two examples of the G.U.I support and editors used by Android Operating systems. Market view point: Although Android O.S relatively new as compared to the likes of Apple Inc, Microsoft’s products and Blackberry, yet trends in recent times have shown a highly staggering value with regard to the masses orientation towards their usage and interest in the operating systems. According to findings and survey of the mobile phone market in 2010, the American markets showed Android was the front runner with nearly 40 percent of the market capture, Apple Inc’s I.O.S was the third in the race and Blackberry the subsequent third. Microsoft and Symbian, the once dominant forces of mobile phone industry have lost their edge and are no way near in the race of front runners at present(Butler, 2011). Model Functionality support: In the case of Android Operating systems, the controller functioning feature is supported in Java programming language. With more detailed and specialized Java S.E Application Program Interface support. Language Support: Android Operating system provides support for number of programming languages. It provides support for C, C++ and Extension Markup language (X.M.L). Architectural view point: Android enjoys an edge with regard to the architectural design. The option of Java support provides an edge to its Kernel which is supported by the Linux kernel. The option of Delvik Virtual machine provides for another edge in comparison to J.V.M and other operating systems. The choice of Virtual Machine: The usage of the Java virtual machine has been quite a predominant concept in the field of operating systems. Android does not make use of the J.V.M; rather it has come up with its own virtual machine option which gives it more utility. The V.M used by Android is Dalvik V.M. The difference between the conventionally present J.V.M and Dalvik can be spotted at an advanced level of operating system understanding and dissection within. Other features of Android: The function and availability of Scripting Language for Android makes the API further rich. It enables easier reach to the applications within. Open source to Restricted to the O.S entities: One of the major trait and feature that distinguishes the two is the open source to the tightly closed operating system category. As a result of this, the chances of development and the applications coming up in Android are far more than in Apple’s I.O.S. under the banner of O.H.A( Open Handheld Alliance) the number of companies that have come together and work under the umbrella of Android Operating system surpasses to over 89 companies, this provides a strong bench strength to Android as compared to their rivals. Encryption key option: Apple Inc, in contrast to the open source nature of Android has a more tightly held operating system and applications launching mechanism. It has a stronger and firmly in check contained encryption maintaining support system for the newly launched applications. As a result of this, the applications so brought forth would be approved only if they pass the test of the library test. The advantage served by this is the fact that this reduces the margin and chances of any kind of malware getting into the network and causing any kind of damage ranging from small scale to large. I.O.S enjoys edge in the category of Data Execution Prevention (D.E.P) and Address Space Layout Randomization. Third party handling: I.O.S has undergone its strategy of handling the Third party clients. From initial reliance on the Safari browser to introduction of new SDKs to Sandbox, all have been introduced to making the I.O.S more user friendly and safer towards operations and clients requirements fulfillment. Malware protection option: Apple Inc, through the use of the restriction access has a more effective mechanism towards the malware protection. This is often termed as the top down approach. Android in contrast does not make use of the same scheme for the purpose of protecting the device and software from any potential malware. It makes use of the clients’ comments and other reviews. Those applications that may have been put forward by the clients yet are not largely welcomed are targeted for possible threat of being a malware. Jail break comes as a potential weakness of Apple Inc. Once that is achieved the device is ever so vulnerable to any kind of malware as its threat and connection with the Apple store has been totally disconnected. It enables access to that part of the memory that is not only vulnerable to writing but also execution modification (Miller, 2011). Applications download comparison: The difference with regard to the number of applications downloaded over period of time in recent times’ shows in intensity and liking of one operating system over the other. Android enjoys an edge in this category. To the report published, as many as two billion android Applications have been downloaded. However the present figure of the total applications that are present in the market are still higher in terms of the Apple Store’s application. The amount of apps that are available in market, apple still has an edge by a digit of over one hundred thousand as compared to that of Android’s applications. Bottom line: With the advancements coming in from all corners and each operating system trying to outsmart the other rival through the introduction of the more specialized techniques and features, the gainer is the end user at the end of the day. It also marginalizes the chances for the low performance providers in the market. The present day existence of Android is an example of the achievements made and the subsequent clients trust as a result of attractive and reliable services and features being provided by them. With the advent of the technologies such as third and Fourth generation applications, the operating systems have their work cut out and they must provide support to all these devices in the same manner (Tilson et.al ,2010). References: Addison, P. B., Nugent, T., & Manning, J. (2014). Learning Cocoa with Objective-C: Developing for the Mac and IOS App Stores. "OReilly Media, Inc. Butler, M. (2011). Android: Changing the Mobile Landscape. IEEE. Goadrich, M. H., & Rogers, M. P. (2011). Smart Smartphone Development: iOS versus Android. Northwest Missouri State University . Miller, C. (2011). Mobile Attacks and Defense. IEEE COMPUTER AND RELIABILITY SOCIETIES. Tilson, D., Sørensen, C., & Lyytinen, K. (2010). Change and Control Paradoxes in Mobile Infrastructure Innovation. London: Department of Management The Information Systems and Innovation Group`. Zovi, D. A. (2011). Apple iOS 4 Security Evaluation. Trail of Bits LLC. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Operating Systems Research Paper Example | Topics and Well Written Essays - 1750 words - 1”, n.d.)
Operating Systems Research Paper Example | Topics and Well Written Essays - 1750 words - 1. Retrieved from https://studentshare.org/information-technology/1636026-operating-systems
(Operating Systems Research Paper Example | Topics and Well Written Essays - 1750 Words - 1)
Operating Systems Research Paper Example | Topics and Well Written Essays - 1750 Words - 1. https://studentshare.org/information-technology/1636026-operating-systems.
“Operating Systems Research Paper Example | Topics and Well Written Essays - 1750 Words - 1”, n.d. https://studentshare.org/information-technology/1636026-operating-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Developments in IOS in Recent Times

Biometrics as an Important Part of Information Technology

It is an important part of information technology in the present times where it allows measuring and analyzing characteristics of the human body.... In the present times, the use of information technology has increased to a great extent that calls for the need of privacy and security of all data and information.... The Growing Need and Application of Biometrics: Need for Privacy and Security: In the present times, the use of information technology has increased to a great extent that calls for the need of privacy and security of all data and information that computers and other network systems hold....
6 Pages (1500 words) Essay

IOS operating systems

Vulnerabilities: Having identified the improvements made in recent times, the history does contain certain events and incidents that were affected by various bugs.... hellip; recent developments have been focused on the consideration of the customers' demands and the security factors.... recent developments have been focused on the consideration of the customers' demands and the security factors.... The most recent vulnerability has been that of file listing, which leaves the margin of safe passage into the network over online medium....
3 Pages (750 words) Research Paper

Flores v. Reno

Examined with be the facts and background of the case, and analysis of what the recent Flores v.... Analysis recent... Professor Name Day Month Year Flores v.... Reno Introduction Children often and seemingly have no voice in society.... Many matters are simply decided for them, and we can only hope that society truly has their best interests at heart....
10 Pages (2500 words) Research Paper

Why and How Should Organizations Develop Comprehensive Email Policy

As is evident in the latest trend, the use of information technology and the internet by the various terrorist outfits have resulted in some of the worst human tragedies in recent time.... The paper "Why and How Should Organizations Develop Comprehensive Email Policy?... explains such regulations are needed because the internet and email become an intrinsic part of corporate culture, keeping staff informed on every aspect of organizational vision, mission, and daily progress....
5 Pages (1250 words) Term Paper

Prevention of Epidemics in Third World Countries Using Data Mining

This coursework "Prevention of Epidemics in Third World Countries Using Data Mining" focuses on the art of collecting data from different sources and analyzing it with the aim of obtaining a summary of useful information.... It is used in various fields such as business and engineering.... hellip; In data mining, data is collected and looked at it through various dimensions....
8 Pages (2000 words) Coursework

4th Generation Based on IMT-Advanced

The introduction of 4th generation technologies is a similar concept that has prevailed in recent times.... hellip; Modern times are driven by advanced digital technological devices.... he 4th Generation technologies come in a sequence of the generational developments that are taking place through different phases.... The third-generation technologies were more or less advancement of the 2nd generation technologies, operating in nearly the same spectrum and same frequency range with relative developments and advancements in the different areas, therefore it was imperative to bring about a technological standard that is relatively wider in operations, more accommodating and makes use of the different and bigger frequency bands in the form of Gigabit band....
11 Pages (2750 words) Coursework

Cyberspace Policy

The paper "Cyberspace Policy" presents that in recent times, almost all business and personal operations are dependent on computers and technology.... With the development of science and technology, the possibility of cyber threats is also increasing rapidly in modern times.... rdquo;(Martin, 2013)The main objective of this paper is to analyze the concept of cybersecurity in association with a recent international event.... It has often been observed that by virtue of cyber security, various ruling parties used to keep track of the opposition which is not at all right....
11 Pages (2750 words) Term Paper

Choosing an Appropriate Windows Server 2012 and Features

hellip; The security of data is the main concern of the servers.... It has a number of inbuilt security features that make it a secure server to use.... These features include the backup management in the cloud, clustering of the storage space, data duplication, and enhanced storage space that offers higher security for the data being stored.... The security of data is the main concern of the servers.... It has a number of inbuilt security....
12 Pages (3000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us