Have you ever wondered how to protect your digital information? Why not start with the computer(s) that we own. We buy, sell, exchange data from one part of the internet to another. Our personal data is all over the PC. Should we ask ourselves if our PC is protected enough, if using them is safe? At first glance, it starts with your operating system. Windows is common anywhere you go. When you buy a new computer, most likely, it will have Windows OS installed. There are other OS, such as Linux, which is, in a sense, more secure than Windows. Linux has more security than any other OS.
The two primes of the market on an OS are Windows and Apple. Consider Linox for a change as it does not have as many exploits as Windows or Apple, says Strohmeyer (2008). There is a low number of malware out there that was created for Linux. Think of it this way, the more popular the OS is, the more viruses, malware, etc, are out there for it. “Obscurity is one of the biggest impediments to malware on Linux” (Strohmeyer, 2008). Do not take this for granted and assume that Linux is bulletproof. Remember, the OS can only help so much; it is up to the user to be secure themselves through their actions and ideas. For example, the user should not download or click on anything that looks suspicious. There are people out there that do not know what that means; for those users, stay clear away from a computer. The computer can only be as secure as the user is. So, please, save your IT department a
A computer is secure if you can depend on it and its software to behave as you expect I this assignment I will writer about how Linux provides security to you information. The major technical areas of computer security are usually represented by CIA confidentiality, integrity, and authentication or availability. It means that information cannot access by unauthorized people.
Linux, or what is here and there known as Unix on a lesser scale is considered and institutionalized on the premise of an open source framework and free for conveyance (Eckert, 2016). The principle reason we see Linux utilized on a constrained premise is because we live in a prevalently Windows Operating System world. Another component conflicting with Linux is that being open source, you need to go get it and really put it on the PC yourself as a client and this is something that numerous clients are somewhat hesitant to attempt and fulfill. A third variable that
Back in 1983 Department of Defense published series of book about security which had color code! The red book was related to network security and the security of system was discussed in the orange book. Base on the orange book an operating system based on its secure design and implementation can be in one of these categories: D, C1, C2, B1, B2, B3, and A1 which is from no security up to Verified protection. Base of Orange book and another evaluation system called Common Criteria both Linux and Windows has similar security. And most security based on how one server implements and being used on each platform.
Data protection and confidentiality; by making sure that all information and important documents are locked away and that you have passwords on the computers and not leaving them unattended without logging off first.
(M3) & (M4) what do we mean by data integrity and security? Data is the most valuable commodity in a PC system. You need to plan and use procedures to enable the safe recovery of user data in the event of data loss during upgrading and also the safe recovery of the entire system in the event of catastrophic failure resulting from upgrading.
Reasonable precautions should be taken in order to ensure the safety of personal files that may be on the user’s computer as they navigate through the Internet. Each situation is different.
When installing any operating system regardless of whether it is a Linux or windows based operating system it is essential that steps are taken to ensure the security of the operating systems. Ensuring the security of an installed operating system before for it is put into use is known as system hardening. System hardening is done by taking known vulnerabilities in an operating system and making security enhancement to mitigate these vulnerabilities. Thus, it is important to know the vulnerabilities which are posed by each operating system and the ways in which they can be mitigate. Below are three common vulnerabilities in windows operating system and recommendations on how to mitigate them.
As such, he introduces a technique of identifying a spectrum of potential vulnerabilities and suggests procedures to deal with them. Systems Specification and High Order Language Implementation are categorized as items of high risk to attacks. Security Policy and Machine Language Implementation are classified as items of moderate risk of being vulnerable to attacks. Circuits Electronics and Device Physics are of low and very low risks respectively. He also discusses potential threats such as deceiving operating systems to grant access to file or data to unauthorized users through direct (overt) and indirect (convert) channels. Walker also says that lack of precise definition of trusted operating systems and the higher cost of building them are the significant drawbacks faced by the vendors. Vendors are concerned that if they build trusted operating systems, they might not be accepted by their customers. The only solution suggested by the author was to have someone or a company builds it, shares the technology used, and convinces the general public on the significance of it. Once it becomes accepted, then there will be a widespread use of trusted computer operating systems.
With our dependency on technology and computers growing in just about every aspect of our lives, from at home to business, we are leaving our information out there for anyone who has the desire to try to get that information. When computers were first used by business and the government it was easy to secure the information stored on the room sized machines. It was as simple as securing the building and rooms that they were in. Now after the invention of the World Wide Web and how we are connected through a series of networks from Personal Area Networks to Wide Area Networks, Any criminal that has the computer skills can potentially gain access any information they desire. Securing our information on our computers and over the networks we use
Have you ever thought about how important it is to keep your information safe? You cannot trust anyone or anything when you are giving out your information. Everything in the world is not the same or as easy as you think. It is harder to where you do not know if you want to do what you were thinking at first. For instance when coming to friends and family, online and school. Now these days we have to watch out on what we are doing.
Dr. Blahblah has implemented a system with an 8-bit random canary that is used to detect and prevent stacke-based buffer overflow attacks. Describe an effective attack against Dr. Blahblah’s system and analyse its likelihood of success.
Security of a system when you are open to the internet is paramount in the world of servers. Linux has many layers of ever evolving security in order to keep up with the would be attackers in cyberspace. This is one of the reasons that Linux is one of the most used servers for internet sites and has few viruses engineered towards it.
This paper analyzes and compares the differences between the Windows and Linux’s operating system in an enterprise. It emphasizes the features in these two operating system such as history, cost, security, user-friendliness, performance, and future trends. It shows how impactful these features can be when an enterprise chooses an operating system. The research in this paper highlights the pros and cons of an enterprise using one operating system or the other. It directs the readers to have a better understanding on which operating system is better for specific instances. Readers will have an enhance perception on Windows and Linux and the platforms they serve. In our paper we try to fully analyze Windows and Linux’s operating system, so an enterprise can choose the best operating system for themselves.
There are advantages and disadvantages of Linux operating system. The first advantages of Linux operating system is it is free to obtain [3]. Unlike Microsoft, Linux distribution can be installed on more than one computer without any cost charged [3]. Besides that, Linux can run perfect on old computers and enable users to browse the Internet, email, play games, create and edit documents and others [3]. In security aspect, Linux is much stronger than Windows. This is because Linux uses smart authorization management [5], which requires user to authorize any action that might harm their computer by entering the password [5]. By this way, users are less likely to be tricked into installing malware and running virus programs [5]. In addition, if user faces any technical problem, they can visit any of the Linux online forums and post the