Sunday, September 22, 2019

Comparative study of security in Windows and Linux Research Paper

Comparative study of security in Windows and Linux - Research Paper Example It is also important to ensure that the user functions do not interfere with the work of the operating system. Since the operating system is large and complex in code, it is suggested to create it in pieces. Each of these pieces should be well defined with respect to their work, inputs, outputs and various internal functions. The look and feel of the Linux operating system is same as that of the UNIX operating system. Linux is much younger than UNIX system. While OpenBSD is also generated over the UNIX framework, it is mostly developed using the security issues into account. In recent times, internal threats implied to the threats that were caused due to the misuse of internal data of an organisation by an internal employee. Nowadays it is not only limited to a dissatisfied employee who misuses confidential data for his/her own profit, but today it is more important to find out the ways by which the person is getting an access to those valuable data. In the same way internal threats to operating system generally occurs due to some internal bugs that were generated during the creation of the Operating system, such as some back door, or some logical errors, that are still not fixed and are open to vulnerabilities. The team that developed this operating system claims that the system had been developed, keeping various security threats in mind. OpenBSD is developed in UNIX. At present it is considered to be number one with regards to the security measures among various other available options, since this system was developed through proactive security measures and implementation of cryptography. OpenBSD uses a pseudo random number generator for its cryptographic encryption purpose. Keeping in mind that security can be breached if the number that is used for encryption gets hacked, resulting in the entire system being open to external attack, the OpenBSD system generates

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.