Open Access Open Access  Restricted Access Subscription Access

An Overview About the Security Architecture of the Mobile Operating System iOS


Affiliations
1 Independent Security Researcher, India
2 Lecturer (Computer Science), Department of Commerce, Bishop Kurialacherry College for Women, Amalagiri, Kottayam - 686561, Kerala, India

   Subscribe/Renew Journal


The use of mobile operating systems is rapidly increasing as the number of smartphone users is increasing day by day. iOS is one of the most popular and widely used mobile operating systems in the world. This document describes an overview about the security features of iOS in its low-level system framework and in its user-level applications framework. The document discusses processes like how security is implemented in the core components of the system, how data protection and encryption is achieved, and how applications are secured by sandboxing.

Keywords

Apple, Application Security, Data Security, Encryption, iOS, Operating Systems, System Security

Manuscript Received: November 2, 2018; Revised: November 25, 2018; Accepted: December 2, 2018. Date of Publication: January 6, 2019.

User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 181

PDF Views: 0




  • An Overview About the Security Architecture of the Mobile Operating System iOS

Abstract Views: 181  |  PDF Views: 0

Authors

Jithu Philip
Independent Security Researcher, India
Merin Raju
Lecturer (Computer Science), Department of Commerce, Bishop Kurialacherry College for Women, Amalagiri, Kottayam - 686561, Kerala, India

Abstract


The use of mobile operating systems is rapidly increasing as the number of smartphone users is increasing day by day. iOS is one of the most popular and widely used mobile operating systems in the world. This document describes an overview about the security features of iOS in its low-level system framework and in its user-level applications framework. The document discusses processes like how security is implemented in the core components of the system, how data protection and encryption is achieved, and how applications are secured by sandboxing.

Keywords


Apple, Application Security, Data Security, Encryption, iOS, Operating Systems, System Security

Manuscript Received: November 2, 2018; Revised: November 25, 2018; Accepted: December 2, 2018. Date of Publication: January 6, 2019.




DOI: https://doi.org/10.17010/ijcs%2F2019%2Fv4%2Fi1%2F142412