1 / 6

Comparing Mobile Phone Security: iPhone vs. Android

This article explores the security features and vulnerabilities of iPhone and Android operating systems, highlighting the differences in app approval processes, potential attack vectors such as SMS messaging vulnerabilities, and Bluetooth exploits. iPhones have a closed app store and stringent app approval, which enhances security. In contrast, Android's open-source nature allows for more user control but poses risks due to malware and compromised apps. Understanding these differences is crucial for users to safeguard their connected devices against potential threats.

kenna
Télécharger la présentation

Comparing Mobile Phone Security: iPhone vs. Android

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Phone Security By: Wade Westergard

  2. Connected Devices

  3. Operating Systems iPhone OS Android OS

  4. Mobile Phone Attacks • SMS messaging vulnerabilities • Website spoofs • Fake applications in android app store • Bluetooth vulnerabilities

  5. Key Differences iPhone • Closed app store • Apple approves apps so you know whether or not they are safe to run • All apps run with administrative control so if one app is infected the whole phone can be Android • Open source • Apps show what capabilities of the phone are needed to run so it’s up to you to decide if its safe • Each app runs in its own sandbox so if one is compromised not all are

  6. Sources • http://news.cnet.com/8301-27080_3-10299378-245.html • http://www.cso.com.au/article/267157/mobile_malware_what_happens_next?pp=1 • http://www.technologyreview.com/communications/24944/page1/ • http://www.pcworld.com/businesscenter/article/170092/android_security_chief_mobilephone_attacks_coming.html

More Related