Verified Document

UNIX Vs. Windows Operating System Research Paper

The authentication process for a Windows operating system at the server level can also be configured to validate the identity of the person logging in at the Windows domain and Microsoft Active Directory Service levels as well. Certificates can be assigned to specific applications, databases and processes within a Windows sever-based architecture and operating system configuration (Vellalacheruvu, Kumar, 2011). Another significant difference between UNIX and Windows security is the definition of the security model itself. UNIX defines permissions to the file level using user name and password, and can also assign security levels of a given process as well (Takeuchi, Nakayama, 2006). In many UNIX operating system versions a UID and GID-based session will be started when a user logs in and attempts a specific application or system-level process. It is possible to add on additional security layers to these UID and GID sessions using Kerberos login authentication technologies and processes, in addition to investing in secured file system architectures as well (Takeuchi, Nakayama, 2006). All of these functional improvements to UNIX however come at a high price and tend to increase the low Total Cost of Ownership (TCO) this operating system provides. The UNIX security model is not as adept at managing security on objects, complex, multi-threaded processes and interlinked TCP/IP commands as well (Vellalacheruvu, Kumar, 2011). Like the many variations of UNIX, the Windows operating system architecture is continually going through a series of modifications and enhancements to become more secure. The Windows Active Directory architecture is designed to eliminate the need for inter-domain trust controllers and the complexities of security on the previous generation...

Parts of this document are hidden

View Full Document
svg-one

Instead the Active Directory uses authentication layering technologies and Kerberos algorithm to increase security resiliency, making the operating system more difficult to hack into.
Process Management

Both UNIX and Windows operating system architectures are multiprocessing, multi-threaded in that both support multiple processes or threads at the same time. Both are also designed to support multitasking, multiuser commands and environments, and multithreading of applications. The Windows architecture continues to promote Win32 and Win64 multithreading of applications for greater performance.

Configuring process management within each operating system is often done with utilities and on occasion with shell scripting. In Windows the majority of these functions are driven by graphical user interfaces (GUI). In UNIX however process management is often handled through shell scripts. As the UNIX architecture in general is not as flexible as the Microsoft one at integration, it is common to find shell scripts that are used for File Transfer Protocol (FTP) and TELNET sessions from one system to another. A shell script is shown below for transferring file.txt to a computer center via FTP command. These types of shell scripts are so pervasive enterprise software vendors use them for moving files from one location to another on UNIX-based servers their software runs on (Iyer, Lee, Venkatramen, Vesset, 2007).

Shell script for transferring a file to a computer center

#!/bin/sh

HOST='ftp.users.computingcenter.edu'

USER='yourid'

PASSWD='yourpw'

FILE='file.txt' ftp -n $HOST

Sources used in this document:
References

Bradley, S.. (2009). Windows 7: Is It Right for You? Journal of Accountancy, 208(5), 32-36,12.

Hartley, D.. (2008). Defending Windows servers. Network Security, 2008(10), 4-8.

Ramon J. Hontanon. (1999, January). Managing Unix security. Network Magazine, 14(1), 52-56.

Bala Iyer, Chi-Hyon Lee, N Venkatramen, & Dan Vesset. (2007). Monitoring Platform Emergence: Guidelines from Software Networks. Communications of the Association for Information Systems, 19, 16.
Cite this Document:
Copy Bibliography Citation

Related Documents

UNIX Marketability Requirements UNIX and Job Marketability,
Words: 1558 Length: 5 Document Type: Essay

UNIX Marketability Requirements UNIX and Job Marketability, 2012 UNIX is the most-used operating system powering enterprise today, surpassing Microsoft Windows and all other operating systems combined. UNIX is also the foundation of the Linux operating systems, many variants of open source software, and is also in large part the theoretical foundation of the Google Android operating system (Sen, Singh, Borle, 2012). As a result of the pervasive adoption and widespread standardization on

Unix/Linux There Are Many Operating
Words: 870 Length: 3 Document Type: Term Paper

Unix provides many more options to an administrator, and having a consultant may help decide what methods would be best for the individual circumstances; administrators making the switch from other platforms will be used to having to just make do with whatever is available rather than being able customize options for best fit. Being the administrator of a server is a skilled task, and is not something that should be

Unix/Linux Systems Vulnerabilities and Controls
Words: 1233 Length: 4 Document Type: Essay

6.30. When there are no restrictions for unprivileged users and if the option for config_rdskernel configuration is set, hackers can write arbitrary values into kernel memory (by making specific types of socket function calls) since kernel software has not authenticated that the user address is actually found in the user segment. The lack of verification of the user address can provide hackers to gain privileges and access to areas that

UNIX Systems Have Been Instrumental in the
Words: 2595 Length: 10 Document Type: Term Paper

UNIX Systems have been instrumental in the information systems management of corporations and organizations for many years. Although in recent years it has been overshadowed by other operating systems, it still remains as an alternative to other systems. The purpose of this discussion is to describe the benefits and problems associated with UNIX systems. The most beneficial aspects of UNIX are the robust nature of the system and the ability to

UNIX Is, Likely, the Oldest
Words: 1059 Length: 3 Document Type: Research Paper

Write programs that handle text streams, because that is a universal interface.' This philosophy evolved to fully permeate every part of the programming industry. Furthermore, the philosophy of using text streams further improved Unix's universality. In the mid-70s the cat got out of the bag. Unix spread through the academic world like wildfire and soon into the corporate world. Because of a pre-existing anti-trust suit, AT&T -- the parent company of

UNIX Linux Operating Systems
Words: 788 Length: 3 Document Type: Research Paper

Linux Security Strategies Comparing Linux Security Applications The pervasive adoption of the Linux operating system has led to a proliferation of new security tools and applications for ensuring the security of systems and applications. The intent of this analysis is to evaluate chroot jail, iptables and SELinux. These three security technologies are evaluated from the standpoint of which organizations were behind their development, in addition to an explanation of how each technology

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now