Free Essay

Application Security on Windows and Linux

In: Computers and Technology

Submitted By AgnarrTyr
Words 890
Pages 4
Abstract
This document will briefly discuss the need and methods of patch management, the importance and considerations of a written business security policy and cross-platform security.
Contents
Table of Contents
1 Abstract
2 Contents
2.1 Table of Contents
2.2 Table of Figures
2.3 List of Tables
3 Patch Management
3.1 Patch Management Defined
3.2 Patch Management Applications
3.3 Patch Management Scripting
4 The Written Business Security Policies
4.1 Importance of the Written Business Security Policy
4.2 Considerations of Creating the Written Business Security Policy
5 Cross-Platform Security Configurations
6 Conclusion 

Table of Figures
Figure 1: Windows to Linux Authentication 

List of Tables
Table 1: Patch Management Applications 

Patch Management
Patch Management Defined
Over the years common security practices have evolved. With these practices the view on patch management has evolved as well. Just a few years ago the common mentality regarding patches was to install and forget. Many systems were deployed and left to their own, few were ever updated. With the rise of worms and malicious code such mentality is no longer accepted. With the new threat levels comes a new focus on patch management. In today’s network environment different methods of deploying and managing patches exist. Networks are unique, like fingerprints, most often no two are identical, and for this reason patch management has to be just as unique. Two of the most common methods of patch management are application based and script based.

Patch Management Applications
Table 1: Patch Management Applications
Application
Description
Platform
Windows Software Update Services
WSUS allows administrators to manage and distribute updates on servers running Microsoft Server 2003, Microsoft Server 2008, Windows Vista, Windows XP SP2 and Windows 2000 SP4
Windows
APT-GET
Apt-get is the command-line tool for handling packages, and may be considered the user's "back-end" to other tools using the APT library. Several "front-end" interfaces exist
Debian Linux
YUM
Yum is designed to use over network/internet. It is a command-line tool for handling packages.
Red-Hat Linux

Patch Management Scripting
Many network administrators rely on scripting to deploy and manage patches. Using Batch scripting, VB scripts or python scripting in Linux platforms, allows the easy installation and tracking of patches. The scripts are designed for each individual network and can be mostly found in smaller network environments.

The Written Business Security Policies
Importance of the Written Business Security Policy
Written security policies have become a necessary evil in today’s network environments. Having written rules defining the accepted use of the company’s network and related applications and information allow the organization to maintain security from computer based and political based attacks. The written security policy clearly outlines what is expected and accepted from end users. The policy will also give consequences if the regulations are broken. This negates the organization from legal attacks should an employee be terminated for violating the policy as well as educate users on what is expected of them when dealing with the network.
Considerations of Creating the Written Business Security Policy
When creating a written business security policy there is several factors that need to be considered. The document must be understandable, people reading the security policy should be able to comprehend it easily making it just as easy to comply to it. The Written security policy must be realistic as well. Having outlandish rules and regulations that no one can live up to simply creates a hostile work environment and will ensure that management will not back the policy when it is presented. Consistency is also a major factor in the written business security policy. You cannot deny internet access for several weeks, allow it for a few months and then deny it again. This causes a sense of distrust among the users and once again leads to a hostile environment where security could be compromised from within. Along with these considerations proper documentation, flexibility and annual reviews of the policy need to be in place.
Cross-Platform Security Configurations
Platform integration aims to consolidate user accounts on a centralized identity management platform. Several products are on the market that will install on a Linux system and convert it into an Active Directory client. In the reverse there are programs such as Samba that will allow windows clients to connect to a Linux machine and share files and resources. Configuring security for this cross-platform network is not a new concept. The standard network security concepts are a foundation for networks regardless of platform. Disable accounts such as guest, rename administrator accounts, and disable root access from remote commands. These ideas are what allow a cross-platform network to remain secure. Often times security is labeled as an application, in essence true network security starts at the foundations, while applications make the deployment of security much easier it is unwise to become soley dependant on these applications for security. The image below demonstrates the authentication methods of a multi-platform network. By applying the previously mentioned security fundamentals it is possible to operate this type of network in a secure manner with the upmost efficiency.

Figure 1: Windows to Linux Authentication
Conclusion
This document has briefly discussed the need and methods of patch management, the importance and considerations of a written business security policy and cross-platform security.

Similar Documents

Free Essay

Is 3440 Final Exam Study Guide

... 1.1 Security Strategies in Linux Platforms and Applications, Pages 22–23 2. 1.2 Security Strategies in Linux Platforms and Applications, Page 7 3. 1.3 Security Strategies in Linux Platforms and Applications, Page 21 4. 1.4 Security Strategies in Linux Platforms and Applications, Page 24 5. 1.5 Security Strategies in Linux Platforms and Applications, Page 10 6. 2.1 Security Strategies in Linux Platforms and Applications, Page 69 7. 2.2 Security Strategies in Linux Platforms and Applications, Page 62 8. 2.3 Security Strategies in Linux Platforms and Applications, Page 39 9. 2.4 Security Strategies in Linux Platforms and Applications, Page 37 10. 2.5 Security Strategies in Linux Platforms and Applications, Page 40 11. 3.1 Security Strategies in Linux Platforms and Applications, Pages 95–97 12. 3.2 Security Strategies in Linux Platforms and Applications, Page 85 13. 3.3 Security Strategies in Linux Platforms and Applications, Page 88 14. 3.3 Security Strategies in Linux Platforms and Applications, Page 104 15. 3.5 Security Strategies in Linux Platforms and Applications, Page 97 16. 4.1 Security Strategies in Linux Platforms and Applications, Pages 116–117 17. 4.2 Security Strategies in Linux Platforms and Applications, Page 138 18. 4.2 Security Strategies in Linux Platforms and Applications, Page 134 19. 4.4 Security Strategies in Linux Platforms and Applications, Page 128 20. 4.5 Security Strategies in Linux Platforms and Applications, Page...

Words: 793 - Pages: 4

Premium Essay

Windown vs Linux

...COMPARISON: WINDOWS VS. LINUX This report is a critical comparison of the computer operating systems (OS), Windows and Linux. It is written for an average audience that uses a computer almost everyday and is now curious to know which operating system is better. The audience is assumed to have sufficient knowledge to understand the various aspects of an OS, but is not aware of the specific details of each OS. This report analyzes the different features of both operating systems in order to arrive at a conclusion on which OS is better for daily use. Both systems are evaluated on a wide range of criteria such as cost, installation process, software applications, hardware, user interface, security/stability, troubleshooting, and the implementation of the OS itself. These will help decide which of the two systems is better to use on a daily basis. Before I begin the comparison the reader needs to know that Windows is created, maintained, and updated by Microsoft. No one from outside can access the underlying code. However, Linux is created and updated by volunteers all over the world, which is why there are so many different variations of Linux like Red Hat, SuSE, MandrakeSoft and a few more. The important features of the operating systems are discussed below. COST The Windows operating system is significantly more expensive than the Linux operating system. In fact, the Linux......

Words: 1216 - Pages: 5

Free Essay

Unix vs. Windows Server

...Unix / Linux vs. Microsoft Windows Server Student Name Goes Here Class Number Goes Here Due Date Goes Here Professor Name Goes Here Unix / Linux vs. Microsoft Windows Server Introduction Pace Glass Company is a global cutting, polishing and bending company with operating facilities in two U.S. cities. Pace Glass Company's major clientele include RV manufacturers, specialty car manufacturers, automotive parts manufacturers, aircraft manufacturers, appliance manufacturers and most prestigiously N.A.S.A. With manufacturing plants in Southwest Michigan and Northwest Ohio, Pace Glass Company's online business plays a vital role in continued growth and as such there is heavy consideration underway as to which type of computer operating base the company upgrades will be implemented against. Pace Glass executives and partners recognize that security and reliability are key to the continued growth in their online presence which plays a substantial role in system determination. Purpose The purpose of this study is to discuss the differences between Unix, Linux and Microsoft Windows and server environments. This study will discuss facts that cover security, administrative, networking, performance, programmability as well as provide a briefing in conclusion. Security Approach A fundamental difference between the Unix approach to system security and the Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural......

Words: 2110 - Pages: 9

Premium Essay

Os Comparison

...Comparison of Windows, Mac OS X and Linux Operating Systems Team A POS/355 March 6, 2015 Memory Management System Memory management is the process of allocating memory during your programs runtime. Memory Management in MAC OS is a multi-core and multi-processor execution that is supported and a programming API, which is called grand central dispatch. It is in the MAC OS. It provides a pool of available threads. There are ways to prevent memory related problems; Freeing data that is still in use, this can cause memory corruption that can result in your application crashing or worse corrupted user data. The MAC operating system can provide most concurrency as possible based on the number of cores available, and those threads depend on the capacity of the system. Windows memory management system is both physical and has virtual memory. It is mainly controlled by the virtual memory managers and pages. “Windows operating system operates on many platforms then it uses page sizes that can range between 4KB to 64KB. So this means that windows virtual memory can control how memory can allocate paging performance” (Stallings, 2013). Committed, Available, and Reserved are three types of regions of space or memory that the operating system can manage. Committed region is space it’s pages that have been stored either in physical or virtual memory. It also allows the process to access the virtual memory pages. Available region is where the address of the process is not being......

Words: 2964 - Pages: 12

Free Essay

Linux

...University of Sunderland School of Computing and Technology File Management System in Linux CUI Interface A Project Dissertation submitted in partial fulfillment of the Regulations governing the award of the degree of BA in Computer Studies, University of Sunderland 2006 I. Abstract This dissertation details a project to design and produce a prototype Linux character environment file manipulation assisting application. The application is offering a friendly menu driven interface to handle the jobs that non-programmers keep finding cumbersome to master when it comes to working in a Unix/Linux interface, resulting in serious mistakes and much loss of productive time. The Linux File Management System is a basic program for every user at a Unix/Linux terminal. Advantages here include the fact that the support team does not have to be burdened with solving simple file based queries by the employees. The areas of Designing GUI interfaces in Linux and Windows versus Linux Security were researched and a prototype has been designed, developed and tested. An evaluation of the overall success of the project has been conducted and recommendations for future work are also given. Words II. Table of Contents 1) Introduction.................................................................................................................................4 1.1 Overview.................................

Words: 17681 - Pages: 71

Premium Essay

Windows Server and Linux Critique

...Riordan’s Windows Server and Linux Critique Learning Team A POS/420 Date: Instructor: Riordan’s Windows Server and Linux Critique At the request of Riordan Manufacturing, Inc., the project team conducted a thorough review to compare the advantages and disadvantages of Windows Server and Linux. The recommendation of an operating system will ensure Riordan’s business operations continue with compatibility between all locations with the highest level of security, administration, networking, performance, and programmabilityimplemented. Security Although there are proponents everywhere for each type of operating system available on the market today, the focus of this project team, at the request of Riordan management, is to compare the security advantages and disadvantages of Windows Server and Linux. Windows Server Advantages. Windows Server has improved over the years in providing basic security provisions for administrators. Access to any system is extremely important to security professionals, such as domain name system (DNS), active directory domain services (AD), and access to web servers using Internet Information Services (IIS). DNS security extensions (DNSSEC) provide added security when a consumer is gaining access to a company’s website as well as how the company......

Words: 1859 - Pages: 8

Premium Essay

Operating System Analysis Paper

...evaluating Microsoft Windows XP, Microsoft Windows Server 2003, and Linux operating systems are to consider the system requirements, the different editions available, security features, system features, updates and support, user interface, and cost effectiveness. Moreover, the best fit operating system can be determined depended on the individual’s or organization’s needs. Operating System Requirements Windows XP The system requirements for Windows XP Home Edition and Professional Edition are the same. These requirements are a PC with a 233 megahertz or higher (a 300 megahertz + processor speed is recommended), 64 megabytes (MB) of RAM or higher (128 MB is recommended), 1.5 gigabytes (GB) of available hard drive space, a video adapter and monitor that is Super VGA (800x600) or higher-resolution, CD/DVD-ROM drive, keyboard, and mouse/pointing device. The Windows XP Starter Edition has different system requirements. These are 233MHz processor or better, 256 MB of RAM, Super VGA (800x600) video adapter and monitor, CD/DVD-ROM drive, keyboard, mouse/pointing device, DirectX 9 graphics with 32 MB of graphics memory, and Internet access is highly recommended. Although Windows XP has minimum system requirements, it also has limits on the physical memory. The maximum RAM supported for the Starter Edition is 512 MB. The Professional and Home Editions both have a physical memory limit of 4 GB. Windows XP will not recognize anything over the limits (Microsoft, 2010). Windows Server......

Words: 4101 - Pages: 17

Premium Essay

Windows Linux Security

...Between Linux & Windows Operating Systems Lecturer/ Hadeel Tariq Al-Rayes  Abstract—Comparisons between the Microsoft Windows and Linux computer operating systems are a long-running discussion topic within the personal computer industry. Throughout the entire period of the Windows 9x systems through the introduction of Windows 7, Windows has retained an extremely large retail sales majority among operating systems for personal desktop use, while Linux has sustained its status as the most prominent Free Software and Open Source operating system. After their initial clash, both operating systems moved beyond the user base of the personal computer market and share a rivalry on a variety of other devices, with offerings for the server and embedded systems markets, and mobile internet access. Linux and Microsoft Windows differ in philosophy, cost, versatility and stability, with each seeking to improve in their perceived weaker areas. Comparisons of the two operating systems tend to reflect their origins, historic user bases and distribution models. Index Term— Kernel, Linux, Operating Systems, Windows II. THE ESSENTIAL DIFFERENCES BETWEEN LINUX & WINDOWS (BEGINNERS LEVEL) 1- Drives don’t have letters, they have mountpoints The first thing that usually trips up people who come from Windows to Linux is that filesystems aren’t assigned letters the way they are in Windows. Instead, there is a single root filesystem whose path is “/”. If you must use the Windows......

Words: 5726 - Pages: 23

Premium Essay

Evolution of the Universe

...UNIX, Linux, Mac, and Windows OS Comparison Paper B. James Bryant UNIX, Linux, Mac, and Windows OS Comparison In 1956, General Motors produced the first OS for its IBM 704 series mainframe. Since then companies around the world, both big and small, have been tirelessly researched, testing, and releasing newer and faster operating systems for the world to use. Among these are systems developed by/for UNIX, Linux, Microsoft, and Apple. In fact, it’s safe to say that these four companies have a monopoly on all current technology used in both the military, corporate, and private sectors all around the world. UNIX Operating System Unix operating systems have the ability to be multi-user, multi-tasking and portable. Multi-user capabilities are accomplished through time sharing which means the processor allocates slices of time to first one process and then the next, sharing the available time in sequence with waiting processes (Nagpal, 2009). Unix can run in either command line interface, CLI, or graphic user interface or GUI mode. A key and unique feature of Unix is that it has a modular design which allows parts of the system to be added or removed without affecting performance of the other parts making Unix systems highly customizable. Unix operating systems have four core components, (1) the kernel, (2) the shell, (3) the file system, and (4) the utilities or tools and applications (Love et al, 2005). The kernel is the lowest layer of the operating system......

Words: 5010 - Pages: 21

Premium Essay

Unix vs Windows Critique

...UNIX® or Linux® Versus Microsoft® Windows Server® Virtual Company: Riordan Kenneth Fleming, Eddy Garcia, H. RaShonda Harris, Lupita Sebastian and John Ward University of Phoenix – POS 420 Introduction to UNIX September 19, 2012 Introduction History Riordan Manufacturing is a global plastics manufacturer who employs over 500 people with projected annual earnings of $46 million. Riordan's major clientele include automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers and bottlers, and appliance manufacturers (Apollo Group, Inc., 2005). With manufacturing plants in Albany, Georgia, Pontiac, Michigan, and Hangzhou, China, Riordan’s e-business plays a vital role in continued growth. Riordan’s Internet site states, “Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. Purpose The purpose of this paper is to discuss the differences between UNIX/Linux versus Microsoft Windows. Our paper will discuss facts that cover security, administrative, networking, performance, programmability. Security Technical One of the key differences between the Unix approach to system security and the MS Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural design. Modularity within the system is another example of architectural security in UNIX, but lacking in MS Windows. These differences in the design and relative security of Unix......

Words: 2022 - Pages: 9

Premium Essay

Technical Essay

... Kym Harris | 4/26/2014 | | Introduction Microsoft Windows, Apple Macintosh, and Red Hat Linux are the most popular operating systems used today. All three platforms have pros and cons, but many users struggle to find the right OS to serve their computing needs. While Macintosh and Linux seem to be impenetrable to viruses, Windows suffers a great deal from such intrusions. On the other hand, users find Windows to be easier to navigate than the other two operating systems. Macintosh, operating on the Apple computer platform is very expensive in comparison to the Windows platform, while Red Hat Linux is completely free and offers much of the same features as any of the others. The biggest advantage of a Windows platform is its ability to be compatible with almost every application, driver, or game available. Of course, Macintosh does not offer this same level of compatibility, as very few programs will run on this platform. Linux can be installed on any computer except Apple, and more flexibility and options than any of its competitors. Microsoft Windows Historical Background * 1981- Microsoft released its first operating system, Microsoft Disk Operating System (MS-DOS). Initially created for IBM computers, Microsoft was able to sign a deal that allowed them to license this product to other companies. MS-DOS used command line instead of the graphical user interface most of us are used to today. * 1985- Windows 1.0 was shipped to its first customer. This OS......

Words: 1689 - Pages: 7

Free Essay

Linux and Windows Server Critique

...Linux versus Windows The purpose of this document is to explore the benefits or disadvantages of using UNIX® or Linux® versus Windows Server® for company business operations at Kudler Fine Foods. Background Three grocery stores in southern California comprise Kudler Fine Foods. Employing approximately 150 people, Kudler caters to people who enjoy gourmet-class foods, first-rate service, and a friendly atmosphere helps make a pleasant shopping experience. Current company information technology (IT) assets include local 10BaseT Ethernet networks at the three locations, Windows Server at the La Jolla headquarters, and 56kb modem links between the facilities enabling sharing of company information. At each store a point of service (POS) cash register application links the 20 total terminals to a proprietary purchasing application for inventory price lookup and monetary exchanges. The company also uses the Windows Server platform to run an e-commerce website for sales of select inventory over the Internet. Security The Kudler Fine Foods e-commerce stores security of the server is the number one priority of team B. Which server is the most secure, Linux or Windows? Many information technicians have their favorite but the bottom line is, which operating system has the target on their back as far a security breaches. According to Noyes (2010) there are five key factors that make Linux superior to Windows. • Privileges • Social Engineering • The Monoculture Effect •...

Words: 2469 - Pages: 10

Premium Essay

Pos/ Final Paper Compare Windows Linux Unix and Mac

...UNIX®/Linux® versus Mac® versus Windows® POS/355 October 29, 2012 Carol S. Eichling UNIX®/Linux® versus Mac® versus Windows® There are several computer operating systems available on the market, and it is sometimes difficult to choose. Therefore, it is important to compare the system capabilities to make the decision easier. The three biggest players in the operating systems market are UNIX®/Linux®, Mac®, and Microsoft® Windows® with Windows® holding the largest market share (Boitor & Brătucu, 2011). These three operating systems are capable of multi-processing and have similar capabilities; however, and it is important to compare and contrast how they handle memory management, process management, file management, and security, which are critical system functions. Discussing memory management, which is a vital component in operating systems, is first. Memory Management Memory management refers to the way a system makes use of the computer’s RAM (Random Access Memory). Many of the operating systems in use on computer systems have positives and negatives in their use of memory attributes. “Memory management is usually divided into three areas: hardware, operating system, and application…although the distinctions are a little fuzzy. In most computer systems, all three are present to some extent, forming layers between the user's program and the actual memory hardware” (Ravenbrook Limited, 2001, p. 1). There are several types of memory, including main memory, file......

Words: 2974 - Pages: 12

Premium Essay

Unix, Linux, and Windows Server Critique

...UNIX, Linux, and Windows Server Critique Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active are just a few of the ways that help close the......

Words: 2750 - Pages: 11

Free Essay

Security Summarized

...Security summarized 1. First of all: there is no 100 % security. Not in real life and not in the digital world. Not even when your computer is running Linux. You should always use your common sense. And even then it can go wrong. A certain amount of risk, however small, is unavoidable. A Frenchman would say: c'est la vie. About viruses, firewalls and exploits I can be brief: Antivirus software 1.1. You don't need antivirus software in Ubuntu, Linux Mint and Debian. Because a virus can't do anything in Linux. Mainly because of this: in order to install on your computer, a virus needs your password. And that it doesn't have. Furthermore, you generally only install software from the secured "software store" (repositories) of your Linux distribution. This is a very effective barrier against malware. Therefore there are no Linux viruses "in the wild" (with the exception of web servers, but securing web servers is quite a different cup of tea). The best protection against viruses is this: - install a well-supported Linux, like Ubuntu or Linux Mint; - check daily for updates; - don't use antivirus, as antivirus in Linux gives only a false sense of security, but simply use your common sense. For the full story, read on (item 2 and further). Firewall 1.2. A firewall is already installed by default. It's called IPtables. IPtables can be managed through the application Uncomplicated Firewall (ufw), which is also installed by default. By default the......

Words: 2232 - Pages: 9