Preview

Operating System Security

Good Essays
Open Document
Open Document
642 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Operating System Security
Operating System Security

Security is the most important part of an operating system when it comes to keeping the system and its information safe. There are various aspects to the security piece in an operating system; which are protocols, kernel and encryption. The UNIX/LINIX, Apple and Windows Server 2008 all have protocol, kernel and encryption features. These features need to be enabled to the highest level in order to have the most security for each of these operating systems. Even though some of these features are already enabled to some level by default, the security level still can be raised for more protection. Starting with the UNIX/LINUX versus Apple operating systems, the most secured versions of these operating systems will be used to demonstrate which is more secured. There are two aspects of these operating systems, desktop and server, however we will stay with the desktop versions of these operating systems. This will allow a more forward approach, so that it will be more understandable for the end user. The LINUX Red Hat Enterprise edition offers the most security of any of the other editions of UNIX/LINUX desktop versions. The protocols of this operating system offer some level of security but there are no new approved security measures built into the security stack. This allows hackers/attacker to be able to gain access easier than newer security measures. One of the newest measures of security in LINUX is SELinux this includes enhancements to the kernel in the LINUX operating system. It provides a security measures that enables access control security policies. This level of security also includes MAC (mandatory access controls) which is a government style level of security measure. This kernel security measure is the highest level of security that this operating system has to offer. When looking into the Apple operating system, OS X offers the most protection of any version of Apple operating system. One of the main security

You May Also Find These Documents Helpful

  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Palmer, M. (2003). Guide to Operating Systems Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 21, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    This is extremely important. If an OS has a know vulnerability and is not patched, it could lead to many problems. Once an OS is installed, applying needed patches or upgrades to correct for known vulnerabilities is essential. Any known vulnerabilities an OS has should be corrected before using it to host a server or otherwise exposing it to malicious users. Below are some ways to harden the server OS.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sharing allows several processes to access the same portion of main memory (Stallings, 2012). When there are a number of processes executing the same program it is beneficial to allow each process to access the same copy of the program rather than have its own separate copy (Stallings, 2012,). The memory management system must therefore…

    • 573 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Which are some of the major recommendations that you would provide to secure any Windows system?…

    • 344 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Linux Course Project

    • 2602 Words
    • 11 Pages

    References: Bodnar, L. (2005, October 5). A Look at EnGarde Secure Linux 3.0. Retrieved from http://lwn.net/Articles/154522…

    • 2602 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Linux is portable, is based on standards, is written in C, has a kernel programming interface, can support many users…

    • 392 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

     I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Unix/Linux

    • 2760 Words
    • 12 Pages

    The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®.…

    • 2760 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    1. A(n) hub____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    The reliance by companies of all sizes on information technology creates strong demand for system and network administration jobs. Information System majors will increasingly find themselves with opportunities and responsibilities in these areas. However, teaching operating systems and networking to information systems major presents many challenges. We have developed a model for teaching these topics to information systems majors in the context of operating system and network administration. This paper describes our model, the lecture materials used, and a novel lab configuration.…

    • 1732 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    By creating groups you can get people access to the information that they need to get to. When a user is created and added to a group that user then has the access permissions of the group that has been made.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cited: Espiner,, Tom. "Linux and Unix 'had More Vulnerabilities than Windows '" ZDNet. ZDNet.co.uk, 5 Jan. 2006. Web. 14 Feb. 2012. <http://www.zdnet.co.uk/news/security-management/2006/01/05/linux-and-unix-had-more-vulnerabilities-than-windows-39245873/>.…

    • 1210 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Stability and Reliability, it has been proven that data loss has occurred mostly in windows based operating system environments rather than opposed to UNIX / LINUX based environments.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Network Security

    • 1021 Words
    • 5 Pages

    Holl, K. (2003), SANS Security Essentials. OSI Defense in Depth to Increase Application Security, p2.…

    • 1021 Words
    • 5 Pages
    Good Essays