Comparison and contrast of security procedures used in Windows and UNIX Environments and Assessment of their Managerial Challenges
Table of Contents
Introduction3
Discussion4
Overview of Windows Operating Systems4
Protected Environment Subsystems7
Overview of UNIX Operating Systems9
Security Risks or Vulnerability of these Operating Systems11
A Joint Administration of Windows and UNIX12
Analysis of Security Procedures12
Identification and Authentication Mechanisms12
Access control mechanisms13
Mechanisms for secure communications13
Biometric Authentication Systems14
Steganography14
Assessment of Managerial Challenges in Pursuing Internet Security15
Final Assessment and Conclusion15
References18
Comparison and contrast of security procedures used in Windows and UNIX Environments and Assessment of their Managerial Challenges
Introduction
Internet security is a set of multi-dimensional techniques, strategies and programs that ensure a ceratin level of protection against an unwanted access. There are a number of programs that give this seurity, through access authentication at Windows NT, object-level security and rights of users, process by the system administrator and so on. To take advantage of the highest levels of security that allows Windows NT, the C2 security level, we need both the hardware and the software right. NT provides tools for audit will enable us to meet our safety standards, but we must bear in mind the safety issues in relation to communications on the Internet. To be sure we are protected on all fronts, it is necessary to know certain techniques. Security can be classified into three functional areas of security at Network Level, Operating system security and data entry (Janczewski & Colarik, 2008, 74).
Until the end of 1988, very few people took the issue of network security seriously, for general-purpose computers. While on one hand, the Internet was growing exponentially with major networks who adhered to it, such as BITNET or HEPNET; on the other, the rise of computer use (up to the eighties very few people could afford a computer and a modem at home) coupled with less technical factors (such as the movie War Games, in 1983) that produced a dramatic increase in the number of hackers. However, on November 22nd, 1988 Robert T. Morris starred in the first major incident of computer security; one of his programs became the famous for Internet worm or just worm. Thousands of networked computers were unusable for days, and losses were estimated in millions of dollars. Since then, the issue of security in operating systems and networks has been a factor to be taken into account by any person or computer system administrator. Shortly after this incident, and in view of the potential dangers that could involve a failure or an attack on U.S. computer systems. DARPA (Defense Advanced Research Projects Agency) created an emergency response team of the most trained volunteers from the IT community, whose main objective is to facilitate a rapid response to security problems affecting Internet hosts. Over the years there has been an evolution gradual structure and capabilities of the systems operating. However, a number of new elements of design in the new OS and new versions of existing operating systems were recently introduced (Lombard, 2003, pp. 135-157). In the fields of application that have influenced the design ...