0% found this document useful (0 votes)
65 views12 pages

Android VS Ios

The document compares the history and security of Android and iOS mobile operating systems. It discusses that Android was created in 2003 and was later acquired by Google in 2005. It highlights that Android is open source and therefore more vulnerable to malware, with threats targeting Android accounting for 90% of all mobile malware. The document also covers the history of iOS, from its debut in 2007 on the first iPhone to the present day. It outlines several security features of iOS like Face ID, Find My iPhone, and access to iCloud data being protected by users' Apple ID. The document provides information on common types of malware like adware, spyware, worms and trojans that can infect Android devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views12 pages

Android VS Ios

The document compares the history and security of Android and iOS mobile operating systems. It discusses that Android was created in 2003 and was later acquired by Google in 2005. It highlights that Android is open source and therefore more vulnerable to malware, with threats targeting Android accounting for 90% of all mobile malware. The document also covers the history of iOS, from its debut in 2007 on the first iPhone to the present day. It outlines several security features of iOS like Face ID, Find My iPhone, and access to iCloud data being protected by users' Apple ID. The document provides information on common types of malware like adware, spyware, worms and trojans that can infect Android devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

13 DE OCTUBRE DE 2022

IOS VS ANDROID

ING. DAVID CONCEPCION CONTRERAS PEREZ


INGLES VI
ROBERTO GONZALEZ ALVAREZ
Contenido
History and security of android..................................................................................2
Types of virus for android..........................................................................................3
History and security of IOS........................................................................................5
Tipos de virus para iOS.............................................................................................6
Comparison table between Android and IOS............................................................8
CONCLUSION...........................................................................................................9
Bibliographies..........................................................................................................10
History and security of android
Android was born in 2003 by Rich Miner, Nick Sears, Chris White and Andy Rubin. This
group intended to create mobile devices that were more aware of users' location and
preferences. The beginnings of Android, totally in secret, were not easy. Rubin's budget
was reduced to zero, and only a loan from Steve Perlman, a close friend of Rubin's,
allowed him to get ahead. In 2005, Google bought Android and turned it into a full
subsidiary. Rubin, Miner and White became part of Google after the operation. Information
back then was scarce about what Android would provide to Google, and rumors said that
the search engine company would enter the mobile market. Andy Rubin got down to work
and created a mobile platform powered by the Linux kernel. Google promised
manufacturers and operators a flexible and upgradable system.
Time passed and until 2007, with the presentation of the
technological consortium Open Handset Alliance. In which were
companies such as HTC, Samsung, T-Mobile, Qualcomm and
Google itself, the existence of Android was not officially
announced. Android's progress was positive from that point on.
And it did not take long to see in stores the HTC Dream, in
2008, which would be the first mobile to make use of the operating platform. Google has
since delivered on Promises related to Android. The system has reached all kinds of
platforms and has been updated, each time taking as a reference a recognizable dessert
or sweet.
One of the virtues of the Android operating system is that it makes use of an easy-to-
handle user interface, with icons and a good disposition that is used especially in smart
devices. Google is recognized for creating simplified user experiences to the maximum in
all its products, something that in Android has been offered since the origins. Android is an
open platform, which means that manufacturers and operators can start from the operating
system and make modifications with their users in mind.
The Android operating system is especially vulnerable to
malware threats. According to a recent study by Juniper
Networks, although in 2010 malware targeting Android
constituted only 24% of all malware threats for mobile devices,
today, these threats account for 90% of all malware intended
for mobile devices. The "open" nature of the platform, which
has been one of the main factors that has contributed to driving
the popularity of Android devices, has also meant that these
devices are the perfect target for malware creators.
To facilitate their dissemination, Google collects these patches in monthly packages, which
it publishes in a monthly newsletter detailing all the vulnerabilities collected. For example,
the May 2020 security patch fixes 39 vulnerabilities in different components. This is the
bulletin of AOSP (Android Open Source Project), on which manufacturers build their own
by adding and removing.
Types of virus for android
A computer virus is "software that aims to disrupt the normal operation of any type
of computing device, without the user's permission or knowledge primarily to
achieve malicious purposes on the device." And in the current era, in which
smartphones have become inseparable from human beings, it is mobile phones
that suffer a large part of the daily cyberattacks that occur. Because on the mobile
we carry all our lives: from personal data to intimate photos, bank details,
addresses, etc.
Computer viruses basically have the function of spreading through previously
infected software, and their nature is varied: there are very harmful and some also
contain a harmful payload with different objectives, from a simple joke to
advertising bombs, the modification of systems, the hijacking of the terminal, the
theft of data, cryptocurrency mining, etc.
Adware
It is that software that offers unwanted or misleading advertising. These ads can
appear in the browser with pop-ups or windows with great visual content, and even
audios. They are reproduced automatically in order to generate economic gains for
the creators. Sometimes this software causes the user's favorite search engine to
be changed by another, generating errors in the desired searches and hindering
the user's browsing experience.
How to avoid it
- Try not to open download links from dodgy pages
- When you install a program or app, review the steps so that no search engine,
program or add-on is additionally installed without you noticing.
Spyware
This type of virus is responsible for fraudulently collecting information about the
user's browsing, as well as personal and banking data. An example of this type of
virus are Keyloggers, which monitor all our activity
with the keyboard (keys that are pressed), and then
send it to the cybercriminal.
How to avoid it
- Install and keep a good antivirus system up to date.
- Avoid connecting unknown devices, such as USB or external hard drives.

Worms
This virus is created with the ability to replicate between computers. It often causes
network errors, as a result of abnormal bandwidth consumption caused by this
malware. Cybercriminals often use flashy names on links to get this virus
downloaded, such as the words: sex, betting, gift or prize.

How to avoid it
- Have your system and defenses updated to be protected
- On PCs and laptops, disable the "auto-run" function on external drives (USB
sticks or hard drives.
- If the antivirus is up to date, it will identify and eliminate this type of threats that try
to sneak into our devices.

Trojan
This type of virus is presented as legitimate software,
but that, when executed, allows the attacker to take
control of the infected device. As a result, your personal
information would be at permanent risk, at the mercy of
the attacker to steal everything they wanted from your
infected computers.

How to avoid it
- Put into practice all the above measures: have updated the operating system and
antivirus, scan the USB devices that are going to connect to your computer,

- Be careful when browsing the Internet, visiting fraudulent websites can cause you
to end up installing something in the background.
History and security of IOS
The history of iOS, from version 1.0 to 14.0 has been a great escalation in terms of variety
and popularity. iOS is the name of Apple's operating system that runs iPhones and iPods.
It is the main software that comes loaded on these devices to allow them to run and
support other applications that has also become the stone in the shoe of Google Android.
The first time the world saw Apple's operating system was on January 9, 2007 when Steve
Jobs showed the public the first iPhone. What made it so special back then was support
for features like multi-touch screen, Visual Voicemail, iTunes integration, and a pre-
installed YouTube app for watching videos, significant advances over the rest of the
mobile devices released to date. At first it did not have a predefined name so it was known
as iPhone OS, but later it would adopt its current name by adding improvements described
below. Thus would begin the history of iOS until version 14.0. iPhone is designed to
protect your data and privacy. Built-in security features help prevent anyone else from
accessing iPhone and iCloud data. Built-in privacy features minimize the amount of
information available to anyone else and you can adjust what information is shared and
where you share it.
Protect iPhone Access
Set a secure code: Setting a code to unlock your iPhone is the most important thing you
can do to protect your device.
Using Face ID or Touch ID: Face ID (supported
models) or Touch ID (compatible models) provides a
secure and convenient way to unlock your iPhone,
authorize purchases and payments, and sign in to
many third-party apps. See Set up Face ID on iPhone
or Set up Touch ID on iPhone.
Turn on Find My iPhone: Search helps you find your iPhone if it's lost or stolen and
prevents anyone else from activating and using your iPhone if you've lost it.
Control which features are available without unlocking your iPhone: Allows or denies
access to some commonly used features—such as control center and USB connections—
when the device is locked.
Your Apple ID provides access to your iCloud data
and account information for services like the App Store
and Apple Music. For information about how to protect
the security of your Apple ID, see Strengthen the
security of your Apple ID on iPhone.

On participating websites and apps, there are


several ways to make login more convenient and secure.
Sign in with access keys: Access keys allow you to sign in to website and app accounts
with Face ID or Touch ID instead of a password. Because a passkey doesn't leave the
devices you're signed in to with your Apple ID, and because it's specific to the website or
app you create it for, it's protected from leaks and phishing attempts. Unlike a password,
you don't have to create, protect, or remember an access key.
Use "Sign in with Apple": You can use your Apple ID instead of creating and remembering
usernames and passwords to sign in to accounts. "Sign in with Apple" also provides the
security of two-factor authentication and limits the information shared about you.
Let your iPhone create strong passwords: If you sign up for a service that doesn't support
passkeys or "Sign in with Apple," let your iPhone automatically create a strong password
that you won't have to memorize.
There are many other ways to make logging in more secure and easier with all your
website and app passwords.
Replace weak passwords: If you create weak or leaked passwords, iPhone automatically
identifies them for you to change.
Share passwords and passcodes securely Use Airdrop to securely share a password or
passcode with someone else using an iPhone, iPad, or Mac.
Use the built-in authentication system for two-factor authentication: For websites and apps
that offer two-factor authentication, you can populate with automatically generated
verification codes without having to rely on SMS codes or other apps.
Easily fill in codes in SMS format: You can fill in one-time codes automatically sent from
websites or apps to your iPhone.
Keep passwords and passwords up to date on all your devices: iCloud Keychain keeps
your credentials updated automatically on all your other devices.

Tipos de virus para iOS


Since 2012, malware affecting Apple's operating systems has quadrupled. We tell
you what the 10 most dangerous viruses for iOS and Mac are. To this day, we all
know that the claim that Apple's operating systems do not have viruses is a myth.
In fact, according to data from Panda Security, for about four years the malware
that infects both Mac OS X and iOS has not stopped growing, going from 500
malicious programs in 2012 to more than 2,200 in
2015.
And how can you tell if your computer is affected?
According to Luis Corrons, director of Panda Labs,
there are some aspects that may indicate that it has
malware: "if you see that your Mac or your mobile
devices or Apple wearables start working
excessively slowly, or if you observe a high consumption of the CPU, memory, disk
or network, you should suspect that your device could have been infected."
So that you know what kind of threats you can face, below, we leave you a list of
the most dangerous viruses for iOS and Mac.

WireLurker: It is the most dangerous malware for iOS. It spreads via USB and can
install malicious apps that pretend to be legitimate apps from the App Store.
However, they are actually modified to hijack the iPhone or iPad or steal the
access keys. You don't need the device to be jailbroken.
KeRanger: It is the first ransomware with the ability to attack Mac OS X. It encrypts
all the files on the computer and asks for a ransom to unlock them.
Yontoo. It's a seemingly harmless browser extension, but it actually injects
malicious advertising that links to compromised sites.
MacVx: This is an annoying adware classified as a Potentially Unwanted Program
(PUP). It attacks almost all browsers and what it does is show false or malicious
advertising.
CoinThief 2014: This Trojan for Mac OS X installs harmful browser add-ons that it
uses to steal the credentials of websites dedicated to
the exchange of bitcoins or sites that support them as
payment.
iWorm 2014: It is a virus for iOS and Mac OS X that
can install applications that steal the keys of all the
services you use. In addition, it can also connect your
device to a network to make DDoS attacks.
Janicab: Malware that takes screenshots and records the audio of the videos you
play to steal your private data.
LaoSh: It spreads through a fake email from a courier company, which includes
taking the victim to a website where he can download a file that takes over the
computer.
MacInstaller: It is one of the oldest scams that continues to be a threat today.
They take the user to pages where they inform that the computer has viruses and
recommend downloading Mac Defender, a supposed antivirus program that is
actually malware that steals credit card data, among other personal information.
Operating Advantages Disadvantages
system
IOS OS X, UNIX(CLOSED CODE) Few customization options
Better performance High cost
Increased security Poor battery performance
Sync in iClude External storage
Excellent usability Apple Maps
Siri
App Store
iOS Mobile Interface
Software updates constantly
Full connection to other iOS
devices
Personalization of the approach

Android Open Source (Linux) Battery life


Greater freedom Complexity
Diversity and versatility Poor quality of some
Multitasking system applications
Increased Community Interaction Vulnerability
Lack of update support

Comparison table between Android and IOS


CONCLUSION
My point of view on android and iOS that are very different operating systems
therefore many like android and other iOS but it goes as the being of each person
many bring iPhone to say look brings an iPhone and you are left thinking it will
occupy too much or it is only for pleasure I want to bet that 85% of people do not
know how to move very well to the System iOS operating this system I think is
more for entrepreneurs than they can use the System 100% because they are very
busy in meetings or always go on a trip they can take advantage of it more and
because the entrepreneurs are also guided by the security of the iOS that for
everything asks you for confirmation more than anything for security another thing I
comment my I do not like iOS because you have everything that buy to and that
you do not run out of the memory of the cell phone because I return to the same
thing you have to do the expense in the cloud to be able to eliminate things from
the cell phone to be able to save more things instead android does not ask you for
many permissions to install an application there is not so much problem with that
but you also risk that you can hakea your cell phone is that for me it is better iOS
but I don't like it that's why I stay with android but I would recommend iOS.
Bibliographies
(Bleger, 2022)
(Raul, 2021)
(keepCoding, 2022)
(Torres, 2020)
(Ibertrónica, 2022)
(Otero, 2020)
(Arteaga, 2016)

You might also like