Preview

Unix/Linux

Best Essays
Open Document
Open Document
2760 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unix/Linux
UNIX, Linux, and Windows Server Critique
POS/420
Name
Professor
Date
University of Phoenix

Abstract
The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®.

Security
At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active are just a few of the ways that help close the gap to unauthorized entry. An advantage UNIX seems to have is its’ lack of popularity, a piece of security in itself, most malicious activity is aimed at the ever-growing Windows empire. Windows, a much younger operating system, released in 1985, has exponentially grown in popularity ever since. Windows popularity is the biggest reason that it suffers malicious attacks more than any other operating system available. The numerous attacks



References: Apollo Group. (2004). Riordan manufacturing. Retrieved April 3, 2011, from Apollo Group: https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/Internet/IndexPort.htm. Hewlett Packard Development Company, L. (2011). HP-UX 11i—HP UNIX® powers the mission-critical Converged. Retrieved April 3, 2011, from Hewlett Packard Development Company, L.P.: http://h71028.www7.hp.com/enterprise/w1/en/os/hpux11i-overview.html. Jongeneel, Victor. (2010). An introduction to informatics. Ludwig Institute. Retrieved from http://www.ch.embnet.org/archives/IntroSlides/index.htm Love, P., Merlino, J., Zimmerman, C., Reed, J  Microsoft. (2011). What 's New in Biometrics in Windows Server 2008 R2 and Windows 7. Retrieved from http://technet.microsoft.com/en-us/library/dd367857(WS.10).aspx Microsoft Corporation Microsoft Corporation. (2011). Windows | OEM. Retrieved April 3, 2011, from Microsoft Corporation: http://www.microsoft.com/oem/en/products/servers/Pages/index.aspx. Noyes, K. (2011). Why Linux is More Secure Than Windows - PCWorld Business Center. PCWorld Communications, Inc. Retrieved from http://www.pcworld.com/businesscenter/article/202452/why_linux_is_more_secure_than_windows.html The Open Group Sentrion Hard Appliances - Sendmail.com. (n.d.). Retrieved April 17, 2011, from Sendmail: http://www.sendmail.com/sm/sentrion_appliances/sentrion_hard_appliances/

You May Also Find These Documents Helpful

  • Good Essays

    Part of the client-server architecture is to house all software in one location; this will in turn increase the security on the mainframe operating systems. Other techniques Riordan Manufacturing would be able use are advanced authentication and…

    • 640 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Pos420 Final Paper

    • 2424 Words
    • 10 Pages

    When beginning a discussion of computer security, a number of variables come into play. From patch availability to OS popularity, antivirus offerings, user/administrator knowledge and even physical user controls, many elements must be considered to create a computing environment that is secure. While Windows and Linux each have their advantages and disadvantages, neither operating system is, at its core, more or less safe than the other from attacks and data theft. All operating systems have vulnerabilities before they ever ship, and it is up to the administrator of those systems to maintain a level of security that protects the valuable data stored on those servers.…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    This document of POS 420 Week 4 Answers to Worksheet includes answers to the next questions: 1. Explain the outcomes of carrying out each one of the following grep commands in your home directory.…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Palmer, M. (2003). Guide to Operating Systems Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 21, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    |Comments on security |Linux can use firewalls, IPS, IDS, and antivirus software. It can also be configured to |…

    • 757 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Many people argue between Windows and Mac OS, which is better and both have the advantages and disadvantages than depend on the person's preference to use one of it. Windows history is deeply rooted and Microsoft develops windows from the past until now. Microsoft Windows is a progression of graphical interface working frameworks created, advertised, and sold by Microsoft.…

    • 1714 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    The goal of this exercise is three fold. Our first will be to provide an inventory of the existing network components for Riordan Manufacturing designated by location, review the network security for each site, and our last goal is to document the current security plan for use in future planning.…

    • 5538 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Netw250

    • 2162 Words
    • 9 Pages

    In this week's lecture, we talk about the items in TCO 2. Each student will be required to perform a Linux installation. Planning for the installation is key, as well as deciding which type of Linux to use for either a workstation or server installation. Please use all items in this lecture and the accompanying lab assignment to provide research for your Project Paper as described in TCO 1.…

    • 2162 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Silberschatz, A., Galvin, P. B., & Gagne, G. (2009). Operating system concepts: Update (8th ed.). Hoboken, NJ: Wiley & Sons.…

    • 669 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Physical Security

    • 272 Words
    • 2 Pages

    This paper is to outline Riordan Manufacturing’s existing Information Security Systems, determine their weaknesses, and develop solutions to those weaknesses by addressing security issues in the areas of physical, network, data, and the web.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mac vs Windows

    • 489 Words
    • 2 Pages

    Windows ' popularity is also a shortfall when it comes to security, as Windows suffers the most from viruses, spyware, adware and other malicious software than any other operating system. There are malicious programs made for Mac as well, but Macs aren 't infected nearly as often.…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Syallabus

    • 1579 Words
    • 7 Pages

    This course is a survey of the UNIX® operations. The student will gain an understanding of the internal operations of the UNIX® system, which enables the user to make efficient use of files, file systems, and processes. Commands for efficient management of UNIX® system files, file systems and process, systems administration and security are also examined.…

    • 1579 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    References: Pegden, R. (2010). The Four Major Trends for Mainframe Replacement. The Datacenter Journal. Retrieved from http://datacenterjournal.com/index.php?option=com_content&view=article&id=4087:the-four-major-trends-for-mainframe-replacement&catid=28&Itemid=100123…

    • 824 Words
    • 4 Pages
    Good Essays