Preview

The Security Behind Mac Osx

Better Essays
Open Document
Open Document
2028 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Security Behind Mac Osx
The Security Behind Mac OSX:
Why Apple, Inc Doesn’t Worry About Viruses
Matthew Long

As many have heard, Macintosh Computers, and more in general Apple Inc., is beginning to really take flight in consumer households. The overwhelming numbers of available viruses to Windows computers, phones, and Android devices surpasses the millions. In fact, in April of 2012, Symantec released a report noting its latest Virus definitions file that contained 17,702,868 separate signatures (Bott). This number seems quite ridiculous regarding the amount of viruses available. However, the same report given by Symantec 8 days earlier only reported 17,595,922 virus definitions, meaning that 106,946 definitions were released in just over a week (Bott). With the information given by Symantec, which is reported frequently, why do computer shoppers still purchase Windows and Android devices? Is it simply because they are cheaper? Or is it the possibility that they don’t know what else is available to them? Many users are not “in the know” about why Windows computers get viruses so easily, and why Macs do not. Let’s begin with Windows.

Just like in the human body, a virus can spread throughout a person’s computer, sometimes without a fighting chance, and become contagious to any other computers on the network or to others via email. There are three main types of “destructive” or “annoying” categories that can be downloaded via the internet or an email. They are Trojan horses, worms, and viruses. “In many cases, e-mail viruses are not "true" viruses because they cannot replicate without human interaction” (How Stuff Works). Trojan horses can simply hide the destructive application in a “package” that must be opened. Usually the package will come in the form of an attached, misleading application that the attacker will prompt the user to open. Once opened, this trojan can be so dangerous as to find the other contacts in your address book and send



Cited: Apple, Inc (2013). Features in OS X. Retrieved from https://developer.apple.com/technologies/ mac/lion.html Apple, Inc (2013). Safety. Built right in. Retrieved from http://www.apple.com/osx/what-is/ security.html Arora, M. (2012, May 7). How secure is AES against brute force attacks? Retrieved from http:// www.eetimes.com/design/embedded-internet-design/4372428/How-secure-is-AES- Brain, M. & Fenlon, W. (2013). How Computer Viruses Work. Retrieved from http:// computer.howstuffworks.com/virus.htm How Stuff Works, Inc (2013). How do viruses and worms spread in e-mail? Retrieved from http://www.howstuffworks.com/question339.htm Simon, M. (2012, February 24). What is Sandboxing? Retrieved from http://www.maclife.com/ article/blogs/what_sandboxing Singh, A. (Aug 2004). A Taste of Computer Security. Retrieved from http:// www.kernelthread.com/publications/security/uw.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Spam – for example when using a programme like Microsoft Outlook you have an address book with all saved email addresses, viruses etc. can gain access to these and use them to send spam emails to other via emails, the recipient is then at threat.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Generally, the majority of the viruses are bundled up with outsider software to make the downloading and installation of pernicious program less demanding. It is likewise appropriated through phishing sites, undesirable taps on suspicious links and ads and pop-ups, opening spam emails messages or its related attachments, visiting dubious sites and porn sites. You can likewise infect your Windows System when you share your documents over peer to peer network. Hackers utilize some strategy to earn profit on the web. Installing plug-in, toolbar, add-on and expansions without thinking about it additionally lead to installation of TrafLab…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * This worm spreads itself by sending an instant message to people in your contact list. When they receive the connection the worm establishes a connection to the remote computer to move itself on the clean remote computer.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Macbook Evaluation Paper

    • 557 Words
    • 3 Pages

    It seems that the major question going around right now is, “Are you a Mac or a PC?” There are many differences between these two completely different types of computers. Many people claim they would never buy a virus infested PC and would stick by their Macbook until death do them part; while others swear by their PC and are disgusted by any other type of computer. There are many types of Personal Computers but the only company you can buy a Mac from is Apple. While the Mac vs. PC controversy continues to bubble both types of companies continue to strive for the perfect computer to offer their consumers.…

    • 557 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    2. Malware sent by email that can be a virus, Trojan horse, worms, logic bombs, or bots…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cyp 3.3, Task 7

    • 1343 Words
    • 6 Pages

    A child or young person may unknowingly download viruses and malware; a programme that can attach itself to another programme, if this is opened through a spam email it can then damage or create files and generate unwanted behaviour to your computer.…

    • 1343 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    A major university opened a new computer lab for their Business School students. Due to the large number of students enrolled in the business school the computer lab had an overwhelming demand. The business school computer was unable to meet the overwhelming demand s the students needed to the computer lab. Therefore, Rod Stevenson, the director of the Student Computer Center decided to hold focus groups. The objective of the focus group was to determine overall student satisfaction with the lab, identify current problem areas and collect student recommendations for improvements.…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ur mama

    • 659 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Apple vs Dell

    • 1634 Words
    • 7 Pages

    On January 24, 1984 Apple introduced the first commercially successful personal computer using a mouse and a graphical user interface[i].Since then the war between PC and Mac users has lived. Claims have been made that Apple is too expensive and PC’s are too slow and of cheap quality. After the introduction of Microsoft’s Windows in 1985 the PC market has been dominated due to Microsoft’s Windows operating system[ii]. The domination of the market is largely due to the flexibility of Windows. Microsoft developed their operating system to be compatible with any hardware created by any computer company such as Dell, HP, Sony, IBM, etc. Consequently, Apple’s operating system only worked with Apple’s proprietary hardware. With the release of Apple’s iPod in 2001, the iPhone in 2007, and most recently the iPad in 2010 the company is headed to be a worldwide competitor in consumer electronics. Partly due to their success in mp3 player and phone market consumers are now more than ever considering Apple as an option when purchasing a personal computer.…

    • 1634 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Android vs. Apple

    • 277 Words
    • 2 Pages

    Going back to Android and iOS, though iOS has very strict in sharing files and even downloading files as compared to Android, it is deemed to have no reports of virus attack since its first release. Indeed, its tight security when downloading and sharing of applications or files make it invulnerable to viruses and gives an edge against Android. Another reason is making it only exclusive for Apple Devices Manufacturer. Unlike the Android, mobile manufacturer and wireless networks are given freedom to customize depending on their preferences. This let virus developer to create virus that could crash Android OS.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays