Verified Document

Linux And Open Source Software Pros And Essay

Linux and Open Source Software Pros and Cons of Linux

"Open source secure operating systems are now available, which are compatible with existing software, and hence are attractive for organizations…" (Guttman, 2005). SE Linux offers well thought out security services. It is good for systems that host Web-facing services that must be exposed to potential attacks…" (Brooks, 2004). SE Linux strengthens the operating system security through tighter privileges and allows for choice among OS vendors. It provides for mandatory access controls and types that determine which resources may be assessed and by whom.

Changing a system's behavior from granting broad permissions to require specific clearance is a complicated process. It requires expertise to configure and use properly and is vendor lacking in support. Writing policies is time consuming and is possible to write conflicting policies. From a user's desktop, this could be confusing during a set up or migration phase.

Corporate users with VPNs could face difficulty transitioning to Vista, especially with biometrics and tokens. Users will have to go through testing periods during migration and will have to support different client side code and separate interfaces that will present retraining issues. The Winlogon and logoff will have to be rewritten for homegrown authentication mechanisms using the Credential Provider model, which dates back to Windows NT. A complex method of chaining will be required that all users will have to move to. The good side is that it will provide more security to the operating system, which means more security for the customers as well in ordering processes.
Open Source Software

Open source software will probably make Fortune 500 companies because it is providing more security in operating systems, which is the first thing that operating systems need in order to provide security for the organization…

Sources used in this document:
Bibliography

Brooks, J. (2004). In operating systems we trust. Eweek, 21(36), 43-46.

Fantana, J. (2006). Change in Microsoft Vista Security System Promises Windows migration headaches. Network World, 23 (18), 9.

Guttman, J.D. (2005). Verifying information flow goals in Security-Enhanced Linux. Journal of Computer Security, 13(1), 115-134.

Sturdevant, C. (2002). FIXES FOR CRACKS IN WINDOWS. Eweek, 19 1), 45.
Cite this Document:
Copy Bibliography Citation

Related Documents

EU Open Source Software Legal
Words: 6964 Length: 25 Document Type: Term Paper

" (Information Society and Media, 2005) f. The eContent Programme and the eTen Programme The 100 million dollar eContent Programme (2001-2005) focuses on encouraging growth and development of tie European digital content industry. This programme funds projects with short time-to-market and as well experiments with new models in business and partnerships through use of technology that is presently available. The programme's stated 'main thrust' is to; Improve access to an expand the

Software Engineering: What Makes It Run the
Words: 878 Length: 3 Document Type: Essay

Software Engineering: What Makes it Run The Software Engineering Online Learning Center sponsored by the Institute of Electrical and Electronic Engineers (IEEE) is a wealth of useful information for anyone interested in the disciplines this organization is committed to advancing knowledge in. Divided into webcasts, DB2 tutorials, Amazon.com and eBay tutorials, Java learning tools and Linux certification tutorials, the learning center strikes a good balance between open source and proprietary software.

Software Engineering: What Makes It Run IBM
Words: 905 Length: 3 Document Type: Essay

Software Engineering: What Makes it Run IBM and the Institute of Electrical and Electronic Engineers (IEEE) have collaborated to create the Software Engineering Online Learning Center, a portal of educational and industry information that is very useful for any student of computer science, programming or software engineering. The intent of this paper is to evaluate this portal for its applicability and value to learning. The portal is designed around IBM-centric content

Pros and Cons of Vmware
Words: 6852 Length: 22 Document Type: Research Paper

Vmware Pros and Cons of VM Ware Over the last several years, the marketplace for servers and virtual machines has become an avenue many technology firms are focusing on. This is because these large devices are used to store tremendous amounts of data for cloud computing. One of the biggest companies is VMware. Founded in 1988, they have transformed how various products and services are delivered to cliental utilizing their computers,

Community Involvement Analysis This Project
Words: 2076 Length: 8 Document Type: Term Paper

Sublicensing may only occur under similar terms of the original license. Its retaliatory clauses are similar to those used in AFL license. The reciprocity concept is clearly stated in section § 1(c) that effectively authorizes software distribution. The part which effectively states that "with the proviso that copies of Original Work or Derivative Works that You distribute or communicate shall be licensed under this Open Software License" (PrestaShop,2012). This statement

Mac Vs. PC: Which Is
Words: 2761 Length: 8 Document Type: Thesis

On this specific aspect of design guidelines, Apple pioneered the development of graphical interface guidelines with the launch of the Macintosh in the 1980s which was promptly followed by Microsoft's Windows development team. While both operating system development teams have taken their own approaches to interpreting and fine-tuning the graphical standards as first defined by Apple, the depth of ergonomics and usability test to the application level is more

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now