ANALYSIS OF TYPES OF CYBER PROTECTION IN MOBILE PHONE OPERATING SYSTEMS

Authors

Keywords:

mobile security, operating systems, cyber protection, Android, iOS, encryption, authentication, sandboxing, malware, data security

Abstract

Modern mobile devices have become an integral part of everyday life and are actively used for both personal and corporate purposes. This has led to an increase in the number of cyber threats targeting smartphones. This article analyzes the types of cyber protection implemented in mobile phone operating systems, such as Android and iOS. Hardware and software security methods, architectural features, and data protection mechanisms are considered. The article contains a comparative table of approaches of the two leading OSes, schemes of protection levels, and a description of the functioning of the main technologies: encryption, authentication, sandboxing, and permission control. Typical threats and methods for neutralizing them are also discussed. Types of cyber protection have been described and classified, their protection mechanisms and implementation examples have been considered. Hardware protection mechanisms are considered using the example of Secure Enclave (Apple) and Titan M (Google Pixel), and a comparison scheme is presented. Software protection is presented using the example of sandboxing and permission control. Authentication and access control methods are listed, a formula for assessing password strength with an example is considered. Network and cloud protection mechanisms such as VPN and secure DNS, Private Relay (iCloud+) and Google Play Protect will be highlighted. The scheme of operation of Private Relay and Google Play Protect is clearly presented. Typical threats to mobile phone operating systems are also shown and a comparative review of Android and iOS security systems is presented according to various criteria. All of this is aimed against malware for mobile device data security. The conclusions are based on a generalization of current implementations of cyber protection, scientific publications and practical research. The presented material may be useful to information security specialists, mobile application developers and users interested in personal data protection.

References

Безпека і кібербезпека смартфонів. Datami Newsroom. 2025. URL: https://datami.ee/ua/blog/bezpeka-i-kiberbezpeka-smartfoniv/ (дата звернення: 22.04.2025).

Кібербезпека. Аспект 2: мобільні телефони. Міністерство оборони України. URL: https://www.mil.gov.ua/ukbs/shhodenni-kiberzagrozi/kiberbezpeka-aspekt-2-mobilni-telefoni.html (дата звернення: 22.04.2025).

Практичні підходи до кіберзахисту мобільних пристроїв за допомогою рішення Endpoint Detection and Response / P. Штонда та ін. Електронне фахове наукове видання «Кібербезпека: освіта, наука, техніка». 2023. Том 1, № 21. С. 17–31. ISSN 2663-4023. DOI: https://doi.org/10.28925/2663-4023.2023.21.1731

Безпека мобільних пристроїв. Кібер Брама. URL: https://stopfraud.gov.ua/cybersecurity-in-life/bezpeka-mobilnyh-prystroyiv-i734 (дата звернення: 23.04.2025).

Безпека у хмарі: поради та кращі практики. Smart. 2023. URL: https://cloud.smart-it.com/news-post/cloud-security-tips-and-best-practices/ (дата звернення: 24.04.2025).

Інтернет-безпека телефона: як запобігти інфікуванню пристроїв. ESET. 2019. URL: https://www.eset.com/ua/about/newsroom/blog/smartphone-security/internet-bezopasnost-telefona-kolichestvo-vredonosnykh-programm-dlya-mobilnykh-devaysov-vozroslo/?srsltid=AfmBOoouo2vzh7CtIfYsO8OuzYxKOiHWraRxnEz-GWOZA6uslkFRLmB43 (дата звернення: 24.04.2025).

Published

2025-05-29

How to Cite

Коновалов, С. М. (2025). ANALYSIS OF TYPES OF CYBER PROTECTION IN MOBILE PHONE OPERATING SYSTEMS. Таuridа Scientific Herald. Series: Technical Sciences, (2), 100-104. Retrieved from http://journals.ksauniv.ks.ua/index.php/tech/article/view/875

Issue

Section

COMPUTER SCIENCE AND INFORMATION TECHNOLOGY