Our mobile devices are perhaps the most diverse and challenging to secure in our infrastructure. Knowing the embedded security solutions of the operating systems common to mobile devices can be part of a security baseline for these devices.