Mobile OS attacks

 Description With mobile operating system attacks on the rise, it is going to be necessary to develop new solutions to mitigate cybersecurity threats.Most solutions that exist take on the form of pre-existing solutions that were meant to be used with desktop and server type operating systems. Thus, embedded operating systems are only just now starting to see their own utilities and solutions being born out of necessity.Describe some of the tools used to protect embedded operating system assets, and add your own personal opinion of how you feel embedded operating system security should be handled in the future.