Preview

Pos420 Final Paper

Powerful Essays
Open Document
Open Document
2424 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pos420 Final Paper
Unix, Linux, and Windows Server Critique
For Kudler Fine Foods
POS/420

Unix, Linux, and Windows Server Critique Kudler Fine Foods is an upscale specialty food store located in San Diego California, with 3 locations in La Jolla, Del Mar and Encinitas. Kathy Kudler opened Kudler Fine Foods in June 1998, and grew quickly to open the 3 locations in as little as 5 years. While the mission is to provide the finest products and to assure Kudler is the purveyor of choice for customers aspiring to purchase the finest epicurean delights, the company must have the best possible technology to meet the business needs. The objective is critiquing possible Servers that will improve the protection of data, provide a stable environment to support business, allow transaction monitoring, store sales transactions from POS terminals, backup data, and manage databases. The purpose is to weigh the pros and cons of the different servers, find the one server that will meet the needs of the business, and implement the server to the end users. The critique will include security, administration, networking, performance, and programmability.
Security
When beginning a discussion of computer security, a number of variables come into play. From patch availability to OS popularity, antivirus offerings, user/administrator knowledge and even physical user controls, many elements must be considered to create a computing environment that is secure. While Windows and Linux each have their advantages and disadvantages, neither operating system is, at its core, more or less safe than the other from attacks and data theft. All operating systems have vulnerabilities before they ever ship, and it is up to the administrator of those systems to maintain a level of security that protects the valuable data stored on those servers. Windows and Linux operating systems have a few large advantages and disadvantages that are worth analyzing when considering security. Interestingly enough, the



References: Jensen, J. (2007). UNIX vs. Windows. Retrieved from http://www.networkbits.net Gite, V. (2006). What is the role of the system administrator?. Retrieved from http://www.cyberciti.biz/faq/what-is-the-role-of-the-system-administrator/ Hart, J. M. (2010). Windows system programming. 4th edition. Upper Saddle River, NJ. Addison-Wesley. Microsoft Tackett, J. and Gunter, D. (1997). Special edition. Using Linux. 3rd edition. Indianapolis, IN. QUE Corporation. Venezia, P. (2011). The decline and fall of system administration. Retrieved from http://www.infoworld.com/d/data-center/the-decline-and-fall-system-administration-375?page=0,1 Capabilities and Functionality Windows Server vs. Linux. (2010). Retrieved 11/29/11 from http://www.networkworld.com/news/2010/060710-tech-argument-windows-server-linux.html?page=1

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS level * Patch history * Resilient computing * Stateful inspection * Whitelists-Blacklists * DB encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Analysis – The basis of service request SR-kf-10, submitted by Yvonne Reynolds, is a thorough analysis of current network infrastructure that should result in documentation outlining current network reliability and uptime, overall performance, topology, protocols, data integrity and security, and overall network security. The analysis effort will be directed toward determining if performance, specifically at checkout, can be improved and, if not, outlining and documenting the requirements and strategy necessary to improve performance, security, and stability. A critical component of the success of this effort is the structure and expertise of the project and analysis team, and the reporting relationship…

    • 899 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 2629 Words
    • 11 Pages

    |Security |Linux users are not burdened with the need for anti |Windows users are burdened with the need for |…

    • 2629 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    |Comments on security |Linux can use firewalls, IPS, IDS, and antivirus software. It can also be configured to |…

    • 757 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    While researching the regulatory requirements needed for First World Bank Savings and Loans I found that a security policy against current server architecture is required to be implemented. The CIA (Confidentiality, Integrity, and Availability) triad is taken into account when analyzing the multiple servers in reference to Linux and Open Source managing security demands.…

    • 295 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Operating System

    • 1099 Words
    • 5 Pages

    Answer: d. It redirects the output of one command to the input of another command.…

    • 1099 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Unix File Protection

    • 716 Words
    • 3 Pages

    UNIX offers a file protection system that is straightforward and simple to use. However, many people are not aware of the value of this powerful mechanism. A secure environment is achieved not only by the operating system, but also through vigilant user and administrative practices. There are many schemes and mechanisms used in the UNIX operating system, as well as some simple tricks that are available to give the kind of file protection administrators want. For the purpose of this paper, a company with 5,000 employees, where 4,990 employees are allowed access to a specific file will be assessed.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Known Operating Syst

    • 507 Words
    • 2 Pages

    In describing known operating security with in the operating systems. I will be describing how the systems are compromised how to counter the attack and what the attack does to the system. In the UNIX systems the vulnerability named shellshock which is a command line interrupter for Linux and Mac OSx, describe how it effects the Bash shell and is used to gain access to systems..…

    • 507 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The targeted consumers is people who have demand for basic server, especially who are interested in one application, especially either of file sharing and web servers, and who seeks the way to minimize the initial purchase costs and subsequent possession costs.…

    • 1011 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The operating system of a large computer system has even more work to do. Such operating systems monitor different programs and users, making sure everything runs smoothly, without interference, despite the fact that numerous devices and programs are used simultaneously. An operating system also has a vital role to play in security. Its job includes preventing unauthorized users from accessing the computer system.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Windows vs Linux

    • 1588 Words
    • 7 Pages

    This article is a comparison between two similar but yet different operating systems Microsoft Windows and Linux. One will have a clear idea about each of these systems and would not find it difficult choosing between them. An operating system is somewhat a software program that connects the users with the hardware of the computer. Without an operating system a computer is useless. There are many different operating systems in the world today. One can argue that Microsoft Windows is the top selling operating system today, while Linux is in the top ten. The purpose of this article is to discuss different features of these two systems for example, price, and ease of use, reliability, software, software cost, hardware, security and support.…

    • 1588 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    2. SPARC T4 Servers offer optimized and improved performance for which types of workloads? Mark for Review…

    • 4069 Words
    • 28 Pages
    Satisfactory Essays
  • Good Essays

    (Dell, n.d.) The hardware cost is the result of the requirement of three Dell PowerEdge R830 Rack Server valued at $167,247.30, a cost of $55,749.10 per server, IT staff efficient hardware and resources to manage all users and data resources. Additionally, two SC7000 valued at $13,998.00, cost of $6,999.00 per server, provides the needed data storage capabilities for the sharing of records, and a redundant backup of financial data. (Dell, n.d.) Firstly, the three Dell PowerEdge R830 are capable of handling all virtualization, databased, and software application requirements, for future system software upgrades and company growth. Secondly, Database software requirement obtain freely in the form of Java Derby Database, with portability and security features allowing to span across multiple hardware platform designations. (NetBeans, n.d.) Thirdly, the servers come preinstalled with Windows Server 2010 R2, providing the software required to integrate all users within one single domain. (Dell, n.d.) Additionally, the active directory software and virtualization software required to operate SAN (storage area network) servers in a raid configuration, the SC7000s. Fourthly, the virtualization capabilities included with the additional…

    • 1110 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Shell Scripting in Linux

    • 34034 Words
    • 137 Pages

    What follows is a copy of the "human-readable summary" of this document. The Legal Code (full license) may be…

    • 34034 Words
    • 137 Pages
    Satisfactory Essays