Windows And Linux Operating Systems From A Security Perspective

04/01/2012
by   Youssef Bassil, et al.
0

Operating systems are vital system software that, without them, humans would not be able to manage and use computer systems. In essence, an operating system is a collection of software programs whose role is to manage computer resources and provide an interface for client applications to interact with the different computer hardware. Most of the commercial operating systems available today on the market have buggy code and they exhibit security flaws and vulnerabilities. In effect, building a trusted operating system that can mostly resist attacks and provide a secure computing environment to protect the important assets of a computer is the goal of every operating system manufacturer. This paper deeply investigates the various security features of the two most widespread and successful operating systems, Microsoft Windows and Linux. The different security features, designs, and components of the two systems are to be covered elaborately, pin-pointing the key similarities and differences between them. In due course, a head-to-head comparison is to be drawn for each security aspect, exposing the advantage of one system over the other.

READ FULL TEXT
research
09/19/2012

Classification Of Heterogeneous Operating System

Operating system is a bridge between system and user. An operating syste...
research
07/21/2020

DBOS: A Proposal for a Data-Centric Operating System

Current operating systems are complex systems that were designed before ...
research
05/29/2012

Proposed Challenges And Areas of Concern in Operating System Research and Development

Computers are a very important part of our lives and the major reason wh...
research
09/01/2016

Suspicious-Taint-Based Access Control for Protecting OS from Network Attacks

Today, security threats to operating systems largely come from network. ...
research
11/26/2019

Moving Fast and Breaking Things: How to stop crashing more than twice

"Moving fast, and breaking things", instead of "being safe and secure", ...
research
03/05/2014

A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems

We present a taxonomy and an algebra for attack patterns on component-ba...
research
08/21/2015

A Case Study on Covert Channel Establishment via Software Caches in High-Assurance Computing Systems

Covert channels can be utilized to secretly deliver information from hig...

Please sign up or login with your details

Forgot password? Click here to reset