Device Security: Here the model interests in the saving access of the device, creating passcodes, restricting device resources, and preventing the installation of unwanted applications or using build-in services. Data Security: The features of this dimension interest about how to protect the user data? iOS uses a 256-bit AES encryption security technique to give iOS the wiping advantage. Also it uses two others techniques: The keychain, which is encrypted to save both user passwords and certificates, and the file encryption. Network Security: iOS provides a set of well-known protocols of network security like Secure Socket Layer Protocol v3 (SSL), Transport Layer Security v1.2 (TLS), and Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol. Those protocols enhance the security of the communications with or through the internet. Application Security: two important mechanisms are used by iOS to ensure the application security, the sandboxing of the applications which is the strict isolation of the different applications, the mandatory code signing, and the reviewing of the applications in the Apple market. The second perspective is introduced by [5]. It discussed the security as a set of different techniques to ensure the security. ASLR: by this technique the executable code and its components such as data and links will be loaded in random memory locations. This randomization makes the memory vulnerability attacks, such as buffer overflow attacks more difficult. Code Signing: for signing the code using trusted known certificate to give the code the authentication attribute. The signing consists from four different components.