Windows vs Linux/UNIX Security for Orgs

The number one fault in Microsoft Windows regarding security is its popularity; the higher the popularity, the greater the target for all manner of security breaches. Though no system is 100% secure, the system that is used for specific purposes such as data centers and workstations of an organization is less likely to be breached. Linux does indeed have security issues, but it can be shown that those issues are at a minimum. Windows operating systems come with a wide array of customizable features to where even the oldest of vulnerabilities can lay dormant, reaching across thousands of updates to surface in newer versions.

Microsoft Windows is such an open source, taking an open stance towards applications, that it cannot sufficiently put a stop to the current infections, nor to the ones that are yet to be designed.

Linux and Unix operating systems are not untouchable regarding security issues. Linux and Unix are equally open to a blank canvas that allows novice and advanced users alike the ability to design the operating system to their or the organization’s needs.

By infiltrating Unix servers, an infection can wind its way through thousands of Linux user’s devices in a matter of minutes. It is important to note that if Unix servers and Linux operating systems are the choice for an organization, advanced technicians should be on hand to monitor and maintain security patches and updates throughout. The low market share of Linux over Windows does not mean that it is less targeted by attackers.

Get quality help now
Dr. Karlyna PhD
Verified

Proficient in: Computer Science

4.7 (235)

“ Amazing writer! I am really satisfied with her work. An excellent price as well. ”

+84 relevant experts are online
Hire writer

However, the absence of a required Anti-Virus program can be attributed to the advanced security configurations that come with each version, open to misconfigurations, hence the need for knowledgeable technicians. Any software needing to be installed on Linux usually comes from repositories that although deemed to be trusted, need special consideration by professionals before allowing it on a system (workstation or server). The greatest benefit of Linux and Unix over Windows regarding security is its security through obscurity stance. Privileges are harder to come by, as the standard user needs root access, meaning only one individual holds the responsibility to make detailed changes to the system. Linux developers are numerous, while Windows developers are few; giving way to the benefit of more dedicated people having the ability to quickly find and correct any code problems, not allowing the “good enough to go” state of mind to advance.

Our team feels that a move from Windows to Unix server, Linux operating system can improve operations fro every department of Huffman Trucking from basic day to day operations to the long-term relationships with customers and vendors. Security of the organization is of great importance and the more advanced requirements of Unix and Linux regarding security can mean a great difference in the company’s future.

Administration

Administration aspects of Red Hat Linux and Windows Server 2012 R2. I chose to look closer at Red Hat Linux for several reasons, but the main reason is that I don’t already know a lot about Red Hat Linux, but also that it’s one of the main Linux operating systems that are used for servers, so it’s good comparison. I will look at the difference in group policy, domain management, domain authentication and database management.

Group policy management is used by Windows Server 2012, but luckily Red Hat Linux has its own version of PDC environment called SAM (Security Account Manager). This allows for authentication as a domain controller and stores the user profiles allowing domain access. As mentioned before, there are group policies that allow settings to be configured on computers from the Windows Server 2012 R2 which allows for easier administration and security settings of the domain. With Red Hat Linux, there are similar settings that can be done for end users running the Red Hat Linux Enterprise Desktop OS. This is where you will run the Red Hat Linux Server OS AND the Red Hat Linux Enterprise Desktop OS, thus allowing settings a security, printers, domain file shares and much more to be accessed and secured using the PDC (primary domain controller) where all authentication is done.

Networking

It is noteworthy that computers utilize operating system to assist people, such as members of the C-level group, to operate their physical machines. However, the operating system runs application software and build new programs. Despite the development of a multiplicity of operating systems over the years, Microsoft Windows, Unix and Linux are the most prominent today.

Windows Server

Windows server is a combination of server-based operating server and has evolved in the last few decades. In particular, it has evolved from the maiden edition, Windows NT 3.1, to Windows Server 2012. Windows Server 2012 is designed to work in a network setting and allows administrators, to set up servers – physical or virtual – from any accessed terminal. One major utility of Windows Server 2012 is its virtualization capabilities and building virtual networks. Similarly, it is bidirectional compatible. That is, Windows Server 2012 can be downgraded to its predecessor, Windows Server 2008R, and vice server.

Windows Server 2012 could be installed on other machines using Hyper-V. Virtual Machines (VMs) are self-contained units that can be easily moved from one physical computer to another, offering a greatly simplified process of deploying network applications and services (Zacker, 2012). The offers the utility of using the Windows Server 2012 on more devices across an enterprise quickly, even if the system is running on another operating system. Windows Server 2012 offers a lot to organizations, especially those intending to set up their cloud computing environment. Even those organizations that are not embracing cloud computing as a short-term goal, the automation made possible by PowerShell is a huge plus.

UNIX

Like other systems, UNIX has one protocol, TCP/IP, and the manipulating the network parameters can be achieved with a GUI or command utilities. It has embedded few tools that enable ease of network maintenance. It has various tools for monitoring protocols or ports, devices, services, as well as, network traffic analysis.

Unlike most operating systems, UNIX is machine independent – it could run on any machine and offer the user more control over the computer. Similarly, it offers the opportunity to change the operating system to make it more compatible with what the user intends to do. While such offering can be powerful and customizable if one is knowledgeable, it could mess up things without knowledge. This suggests that UNIX expert will be needed on site to optimally use UNIX and installing something as simple as new products and updates can look complicated for a non-UNIX expert.

Linux

The networking of features of Linux Server differs from other operating systems. For instance, Red Hat Enterprise offers different deployment options for the network. In particular, a deployment setup is provided with an option of utilizing a traditional command line terminal for networking (Sharma, Kabir, & Norton, 2005). The terminal also uses the intrinsic ifconfig to control individual interfaces, much like a switch within the system terminal (Sharma, Kabir, & Norton, 2005). However, the ability to create virtual interfaces is not standardized in other operating systems. This feature provides the ability for an administrator to configure multiple interfaces on a single machine (Whittaker & Davies, 2011).

Cite this page

Windows vs Linux/UNIX Security for Orgs. (2022, Feb 22). Retrieved from https://paperap.com/microsoft-windows-security-issues-and-the-use-of-linux-and-unix-as-the-choice-operating-systems-for-an-organization/

Let’s chat?  We're online 24/7