Preview

Comparing the Security of Windows 7 to a Linux-Based Operating System

Good Essays
Open Document
Open Document
438 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Comparing the Security of Windows 7 to a Linux-Based Operating System
Topic: Comparing the security of Windows 7 to a Linux based operating system
General Purpose: To inform
Specific Purpose: At the end of my speech, my audience will be able to differentiate the two operating systems security.
Central Idea: Comparing the security of Windows 7 to a Linux based operating system

Introduction: Good evening, I am here tonight to explain the very basic securities of two very different operating systems. Windows 7 has been out for a couple years now and has what some say to be a better secured system than other versions of windows. Windows was always a point of interest for security because of the security that windows has, or a lack of security, depending on who you ask. I am going to get into the basic details of windows security and compare it to a lesser known operating system called Ubuntu and how they differ but also how they are same.

Windows Security windows recommended security measures anti virus, anti-spy ware and malware programs are recommended and in turn use up resources windows firewall is a very useful firewall user account control (UAC) to confirm a change in the system UAC is good that it lets you know when a system change is being made UAC does not require a password, so anyone can really change anything leaving system vulnerable Windows assumes you are admin and treats permissions as such Ubuntu Security Ubuntu security measures viruses and malware generally do not exist for Linux OS's, although if one did get one a Linux machine it probably would have no effect firewall is very useful and can be configured through a command-line, using less resources Linux “sudo” command sudo is so you are never logged in as admin and do not have admin permissions sudo requires a password so only admin can make changes to system Ubuntu updates are far more frequent than windows Common Securities

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. All permissions and policies will be uniform when Active Directory is employed into the infrastructure. Administrators can change permissions and privileges to meet requirements for that group or department.…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2460

    • 271 Words
    • 2 Pages

    Installs and removes roles, role services and features. Also displays the list of all roles, role services, and features available, and shows which are installed on this computer. For additional information about the roles, roles services, and features that you can specify using this tool, refer to the Help for Server Manager.…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Pos420 Final Paper

    • 2424 Words
    • 10 Pages

    When beginning a discussion of computer security, a number of variables come into play. From patch availability to OS popularity, antivirus offerings, user/administrator knowledge and even physical user controls, many elements must be considered to create a computing environment that is secure. While Windows and Linux each have their advantages and disadvantages, neither operating system is, at its core, more or less safe than the other from attacks and data theft. All operating systems have vulnerabilities before they ever ship, and it is up to the administrator of those systems to maintain a level of security that protects the valuable data stored on those servers.…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    Solomon, M. G. (2014). Security Strategies in Windows Platforms and Applications. Burlington: Jones & Bartlett Learning.…

    • 338 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 2629 Words
    • 11 Pages

    |Security |Linux users are not burdened with the need for anti |Windows users are burdened with the need for |…

    • 2629 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    MGS 351 FINAL TIPS

    • 313 Words
    • 2 Pages

    9. intusion detection software: look ppl who should not be there. back up:copy the info. security auditing software: checks out the weakness of your computer.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    According to Wikipedia.com (2011), “the Windows 9x operating system is designed as a single-user system. Thus, the security model is much less effective than the one in Windows NT.”…

    • 608 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment 1

    • 509 Words
    • 3 Pages

    Zone –Alarm is a two way firewall. The software is free! It also provides an array of features like identity theft protection, online backup’s, and web security. Linksys has firewall settings on their SOHO routers. These firewalls protect the entire network. Most of the SOHO routers on the market today are wireless and provide all different types of wireless security including WPA 2 and also allowing for parental control. Firewalls are sometimes bought as a standalone device but most of the time these days they are built into the router. Software routers are installed on your computer and protect your computer from unwanted traffic.…

    • 509 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    I. Track and monitor abnormal employee behavior, erratic job performance, and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on AUP monitoring and compliance.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    POS 420 Week 5 UNIX Paper

    • 541 Words
    • 4 Pages

    See the Assignment 1 post in the Main forum or Course Materials forum for detailed instructions.…

    • 541 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    remote access and data trolling capabilities alone will cause the attacker to access any and all desired…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    paper

    • 362 Words
    • 2 Pages

    whether that application starts as a service on the system or must be run manually.…

    • 362 Words
    • 2 Pages
    Good Essays
  • Better Essays

    When considering which operating system for a home or business office computer or network of computers, it is important to evaluate all areas of the different operating systems options. When evaluating Microsoft Windows XP, Microsoft Windows Server 2008, and Linux operating systems it is important to consider the system requirements, the different editions available, security features, system features, updates and support, user interface, and cost effectiveness. Depending on what a person’s or organization’s needs are will determine which operating system is best fit.…

    • 4523 Words
    • 19 Pages
    Better Essays