Windows And Unix

Read Complete Research Material

WINDOWS AND UNIX

Comparison and contrast of security procedures used in Windows and UNIX Environments and Assessment of their Managerial Challenges

Table of Contents

Introduction3

Discussion4

Overview of Windows Operating Systems4

Protected Environment Subsystems7

Overview of UNIX Operating Systems9

Security Risks or Vulnerability of these Operating Systems11

A Joint Administration of Windows and UNIX12

Analysis of Security Procedures12

Identification and Authentication Mechanisms12

Access control mechanisms13

Mechanisms for secure communications13

Biometric Authentication Systems14

Steganography14

Assessment of Managerial Challenges in Pursuing Internet Security15

Final Assessment and Conclusion15

References18

Comparison and contrast of security procedures used in Windows and UNIX Environments and Assessment of their Managerial Challenges

Introduction

Internet security is a set of multi-dimensional techniques, strategies and programs that ensure a ceratin level of protection against an unwanted access. There are a number of programs that give this seurity, through access authentication at Windows NT, object-level security and rights of users, process by the system administrator and so on. To take advantage of the highest levels of security that allows Windows NT, the C2 security level, we need both the hardware and the software right. NT provides tools for audit will enable us to meet our safety standards, but we must bear in mind the safety issues in relation to communications on the Internet. To be sure we are protected on all fronts, it is necessary to know certain techniques. Security can be classified into three functional areas of security at Network Level, Operating system security and data entry (Janczewski & Colarik, 2008, 74).

Until the end of 1988, very few people took the issue of network security seriously, for general-purpose computers. While on one hand, the Internet was growing exponentially with major networks who adhered to it, such as BITNET or HEPNET; on the other, the rise of computer use (up to the eighties very few people could afford a computer and a modem at home) coupled with less technical factors (such as the movie War Games, in 1983) that produced a dramatic increase in the number of hackers. However, on November 22nd, 1988 Robert T. Morris starred in the first major incident of computer security; one of his programs became the famous for Internet worm or just worm. Thousands of networked computers were unusable for days, and losses were estimated in millions of dollars. Since then, the issue of security in operating systems and networks has been a factor to be taken into account by any person or computer system administrator. Shortly after this incident, and in view of the potential dangers that could involve a failure or an attack on U.S. computer systems. DARPA (Defense Advanced Research Projects Agency) created an emergency response team of the most trained volunteers from the IT community, whose main objective is to facilitate a rapid response to security problems affecting Internet hosts. Over the years there has been an evolution gradual structure and capabilities of the systems operating. However, a number of new elements of design in the new OS and new versions of existing operating systems were recently introduced (Lombard, 2003, pp. 135-157). In the fields of application that have influenced the design ...
Related Ads
  • Comparison Of Unix, Linux...
    www.researchomatic.com...

    UNIX , Linux and Solaris are on one group, the ...

  • Managing A Unix Network E...
    www.researchomatic.com...

    (Bach, 2006, 21) Altiris systems management software ...

  • Exploring Unix/Linux Oper...
    www.researchomatic.com...

    Linux is based closely after UNIX with elemen ...

  • Unix
    www.researchomatic.com...

    Unix, Unix Essay writing help source. ... Uni ...

  • Unix
    www.researchomatic.com...

    MIT contributed to the UNIX evolution during ...