Ios operating System: First Researcher: Second Researcher: University Name: Subject: Introduction


Download 37.53 Kb.
Sana17.06.2023
Hajmi37.53 Kb.
#1533553
Bog'liq
860457 i-o-s2


IOS Operating System:
First Researcher:
Second Researcher:
University Name:
Subject:


Introduction:
Apple Inc’s operating system in the domain of mobile phones is formally known as the IOS. Apple Inc enjoys a credible name in the field of digital equipments in form of the cell phones, tablets and complete computers. Recent developments have been focused on the consideration of the customers’ demands and the security factors. The Mobile phone oriented operating system was formally introduced to the market in around 2007 and since then it has never looked back and I Phone stands amongst the top market players in the field of mobile phones (Tracy 2012).
Keywords:
Vulnerability, Security factors, malware, File System
What is it exactly?
Operating systems are the backbone to all the digital devices. They define and decide the quality of services being provided. Operating systems are a set of large number of functions and programs that allow the users with the interface and functions performing on the outer screen (Brateris 2011).

Apple’s IOS has certain distinguishing features to it that make them more sought after and reliable, one of the most sparkling features of it is the protected services against the malware and bugs. Other operating systems are considerably highly prone to the menace of viruses.


App Store is one of the largest online resort that contains large number of applications and programs that are being downloaded by the users on daily basis.
Features:
IOS operating systems in the domain of mobile phones have made a long way ever since its revamped form was introduced in form of the Apple 3 mobile phones. Since then it has been proceeded by I Phone 4, and now present standing is at I phone 5. Some of the salient features of it include the voice recognition function, advanced sensors, an application of Siri, and numerous other applications easily downloadable from the app store.

Latest version:
IOS’s version 6 was being followed with the 7th version in the series with focus on further improved services and minimum of vulnerabilities in the overall system (Inc 2012). Backward compatibility of version 7 is also applauded all over along with the security aspect. The company’s claim is based on the total revamping and providing a new direction to the mobile operating systems via this version.
Being claimed and dubbed as one of the specialized operating system in the entire arena of digital devices, it provides numerous facilities and functions such as the support for cloud services, messenger for instant messages and
Security aspect:
Security has been a serious threat and headache for almost all operating systems and major players. Keeping this concern and cry in view, Apple Inc in its latest version has come up with special security considerations that would further allow for safe usage and reduced abuse of the device in case of theft and loss. Features like “Activation lock” are few of the factors that have been added to build on the wall of security of the incumbent operating system.(Inc 2012)

Reference: (Inc 2012)

A multi layer security infrastructure is implanted making the operating system more reliable and effective. The security mechanism is being devised with due regard of the network settings, architectural compatibility (Asthana & Asthana 2011), techniques for encryption, decryption and various other functions and components that complement the security dimension of operating system.


Support system:
The support system with regard to the security includes Secure Socket Layer and Transport Layer Security support. Access to devices is also controlled and no unauthorized access can be made.
Vulnerabilities:
Having identified the improvements made in recent times, the history does contain certain events and incidents that were affected by various bugs. One similar bug was faced in the 6.1 version that had the loophole of unauthorized access. Pass code security is another area that is termed vulnerable. The most recent vulnerability has been that of file listing, which leaves the margin of safe passage into the network over online medium. Despite having relatively well shielded and programmed kernel, it is still at a direct threat from the malicious content in one way or the other. The certificate publication and issuing is another area where the operating system has been targeted and fake certifications have been generated. Having experienced various forms of challenges and attacks, the developers are working to make it further bug prove and make it more user friendly with regard to the safe usage and reliability.
The updates over period of time have been implemented for the same reason to bring about more reliability in the incumbent operating system.

References:


Asthana, A., & Asthana, R. (2011). IOS 5, Android 4.0 and Windows 8 – A Review. I.E.E.E, 34-43.
Brateris, D. (2011). iOS hardware as a sensor platform: DMM case study. I.E.E.E, 308 - 311.
Spaulding, ,. J. (2012). Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices. I.E.E.E, 87 - 93.
Tracy, K. .. (2012). Mobile Application Development Experiences on Apple’s iOS and Android OS. I.E.E.E, 30-34.

Download 37.53 Kb.

Do'stlaringiz bilan baham:




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling