Mobile Operating System Features
Key Takeaways
- iOS is a closed ecosystem with strict App Store controls, while Android is more open and allows sideloading apps from third-party sources.
- Mobile Device Management (MDM) solutions allow enterprises to enforce security policies, remotely wipe devices, manage apps, and configure settings across all company mobile devices.
- Both iOS and Android support GPS, cellular location, and Wi-Fi triangulation for location services — IT policies can restrict location access per-app.
- Screen lock options include biometrics (fingerprint, facial recognition), PIN (4–6 digits minimum), pattern lock, and passwords — with biometrics being the most convenient and PIN/password being the most universally reliable.
- Factory reset removes all user data and returns the device to its original state — important for decommissioning devices or resolving persistent software issues.
Last updated: March 2026
Mobile Operating System Features
iOS vs. Android
| Feature | iOS (Apple) | Android (Google) |
|---|---|---|
| Source | Closed-source (Apple proprietary) | Open-source (AOSP) with vendor modifications |
| App Store | Apple App Store only | Google Play Store + third-party sources (sideloading) |
| Customization | Limited (Apple-controlled UI) | Highly customizable (launchers, default apps, widgets) |
| Updates | All devices receive updates simultaneously | Updates vary by manufacturer and carrier |
| File System | APFS (Apple File System) | ext4 (varies by manufacturer) |
| Development | Swift, Objective-C | Java, Kotlin |
| Device Encryption | Always on (since iOS 8) | On by default (since Android 6.0) |
| Backup | iCloud or iTunes/Finder | Google account or manufacturer cloud |
Mobile Device Security
Screen Lock Methods
| Method | Security Level | Notes |
|---|---|---|
| Swipe | None | No security — just prevents accidental input |
| Pattern | Low-Medium | Connect dots in a pattern; can be observed (shoulder surfing) |
| PIN (4-digit) | Medium | 10,000 possible combinations; vulnerable to brute force |
| PIN (6-digit) | Medium-High | 1,000,000 possible combinations |
| Password | High | Alphanumeric with special characters; most secure manual option |
| Fingerprint | High | Biometric; fast and convenient; may fail with wet/dirty fingers |
| Facial Recognition | High | Biometric; hands-free; may fail with masks or in dark environments |
Failed Login Restrictions
- Both iOS and Android can be configured to wipe the device after a set number of failed login attempts (e.g., 10 attempts)
- Enterprise MDM policies typically enforce this as a mandatory security requirement
- iOS locks out the user for increasing time intervals between failed attempts
Mobile Device Management (MDM)
MDM allows organizations to manage, secure, and monitor mobile devices across the enterprise:
Key MDM Capabilities
| Capability | Description |
|---|---|
| Remote Wipe | Erase all data on a lost or stolen device |
| Remote Lock | Lock the device immediately |
| Geolocation Tracking | Track device location in real time |
| App Management | Install, remove, or restrict applications |
| Policy Enforcement | Require screen locks, encryption, password complexity |
| Configuration Profiles | Push Wi-Fi, VPN, email, and certificate configurations |
| Content Management | Control access to corporate documents and data |
| Containerization | Separate personal and corporate data on BYOD devices |
BYOD (Bring Your Own Device) vs. Corporate-Owned
| Aspect | BYOD | Corporate-Owned |
|---|---|---|
| Device Ownership | Employee | Organization |
| Privacy | MDM should only manage corporate container | Full device management |
| App Installation | User controls personal apps | Organization controls all apps |
| Wipe Scope | Corporate data only (selective wipe) | Full device wipe |
| Cost | Employee purchases device | Organization purchases device |
Location Services
Mobile devices use multiple methods to determine location:
| Method | Accuracy | Battery Impact | Works Indoors? |
|---|---|---|---|
| GPS | 3–5 meters | High | No |
| Cellular Triangulation | 100–300 meters | Low | Partially |
| Wi-Fi Positioning | 15–40 meters | Low | Yes |
| Bluetooth Beacons | 1–3 meters | Very Low | Yes |
Location Privacy Controls
- Users can grant location access per-app: Always, While Using, Never, or Ask Next Time
- IT administrators can restrict location services through MDM policies
- Disabling location services prevents GPS, but cellular and Wi-Fi still reveal approximate location
Essential Mobile Device Operations
Factory Reset
- Removes all user data, apps, and settings
- Returns the device to its original out-of-box state
- iOS: Settings > General > Transfer or Reset > Erase All Content and Settings
- Android: Settings > System > Reset > Factory Data Reset
- Use cases: decommissioning, selling/donating, resolving persistent issues
Backup and Restore
- iOS: iCloud backup (automatic, over Wi-Fi) or local backup via Finder/iTunes
- Android: Google account backup (automatic) or manufacturer backup service
- Backups include app data, settings, photos, contacts, and messages
OS Updates
- iOS: Settings > General > Software Update
- Android: Settings > System > System Update (varies by manufacturer)
- Enterprise devices may have updates controlled by MDM to prevent compatibility issues
Email Configuration
- POP3: Port 110 (SSL: 995) — Downloads email to device, optionally deletes from server
- IMAP: Port 143 (SSL: 993) — Syncs email across all devices, keeps messages on server
- SMTP: Port 25 (SSL: 465, STARTTLS: 587) — Outgoing mail
- Exchange ActiveSync: Microsoft protocol for email, calendar, and contacts sync
- Modern: OAuth 2.0 authentication replacing traditional username/password
Test Your Knowledge
What MDM feature allows an administrator to erase all data on a lost company phone?
A
B
C
D
Test Your Knowledge
Which location technology provides the best accuracy but does NOT work well indoors?
A
B
C
D
Test Your Knowledge
In a BYOD environment, an employee leaves the company. What type of wipe should be performed on their personal device?
A
B
C
D
Test Your KnowledgeMatching
Match each email protocol to its primary function:
Match each item on the left with the correct item on the right
1
POP3
2
IMAP
3
SMTP
4
Exchange ActiveSync