Module 5 Exercise 1
Securing Desktop & Mobile Operating Systems
Sierra Baltins
Friday
Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks. These threats can come in many forms, users can get viruses on their computer or an actual person can hack into the user’s account. A user who wants the best protection will need to keep the choice of operating system in mind. …show more content…
Despite most people’s thoughts, mobile devices may be much more protected than desktops. Anyone using a mobile device can access virus-infected websites and will be just fine. On the other hand, a desktop user accessed a site containing very little threat may still have a high chance ruining their computers.
Similar to the Qubes operating system, mobile devices use sandboxing to isolate the applications. Nobody has user right to any of the mobile applications which also aids the security system. This also disables backward compatibility which is what makes the desktops more prone to cyber-attacks. Although the mobile devices may have a good security system, the operating system the device uses will determine the security features.
I believe that no matter which operating system is used, the user can use dangerous sites without affecting the devices. It’s the application the user may have to be wary of. An iPhone may be a safe option although the user has a limited option of applications to use. Android is a part of Linux meaning that the user will have more access to information Windows and iPhone user may not be able to. Since the user has access to more information, certain applications can also look at private