StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Mac and Windows Security System - Literature review Example

Cite this document
Summary
This review 'Mac and Windows Security System' is about differences between two operating systems in their security. While their mode of operation is different, the security features are also different. The two systems mainly differ in the memory management, data processing and file management. Windows allows for the sharing of memory between processing tasks which is no allowed in Mac system. 
 …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Mac and Windows Security System
Read Text Preview

Extract of sample "Mac and Windows Security System"

Mac Vs Windows Security Mac and Windows are the most dominant operating systems that are used in many computers. While their mode of operation is different, the security features are also different. Thus, Mac and Windows differ in their systems of process management, management of files in the systems and also memory management, with windows allowing for memory sharing between processes, resuming to the open files after a power outage or forced reboot, some aspects that are missing in the Mac system, which makes Windows more vulnerable to security breach and attacks. Overall, due to the application of the executable codes for read-only memory in the Mac system, which hinders sharing of memory address spaces between scheduled tasks, Mac systems is able to avert security breaches and attacks more easily. Introduction The debate over which operating system between Mac and Windows is more secure against the threat of computer attacks has been there for the last two decades now. The advancement in security threats has made it important for computer users to be able to understand the computer system that is able to offer superior security against the ever-changing threats. Mac is a system that was initially released in 1984, with the system being based on a UNIX system that comprised of 128 KB memory and 7.8 MHZ CPU data processing speed [1]. However, subsequent advancements have been done to improve on the initial features of the Mac system, with the latest version of Mac being the OS X, which has far more advanced features. On the other hand, the Windows operating system was first released in 1985, based on C and C++ system. The initial Windows operating system comprised of 256 KB memory and 7.8 MHZ CPU data processing speed [2]. Subsequent advancements on the system has seen the rise of windows from Windows 1 to the current Windows 8, which is the latest version of the Windows operating system currently in the market, while a newer version of Windows 8.1 is on the offing [2]. Thus, this analysis seeks to compare Mac operating system to the Windows operating system, with a view to establishing which of the system is more secure against the threats of attacks, based on process management, memory management and file management, as well as on their modes of operation. Mac Vs Windows initial features Mac Windows Initial Release Date 1984 1985 System base Unix C and C++ Memory 128 KB 256 KB Processor Speed 7.8 MHz CPU 7.8 MHz CPU Latest Version OS X Windows 8 Process Management Process refers to tasks that are under current execution. In computer systems, process may refer to the tasks of reading data from the file, writing data to a file and/or printing files. The data state being processed by the computer operating systems may take any of the form of ready, active or waiting file. Under the process management, each processing system has its own means to an end for processing data requests. Process management in Windows applies a data processing system that runs on different platforms, thus it is not complex [3]. This system operates such that it allows for the subsystems of Windows to mimic the nature of other process, such that each process starts when the Window systems user requests a task. Once requested, a primary security token is assigned to the task, alongside the other process attributes, services and actions that are required to accomplish the tasks [4]. The security token assigned to each requested task comprises of information that allows the user to perform restricted functions or to access secured objects, which eventually transforms into a process of execution based on which security access mode the user prefers to accomplish the task. Thus, the windows system starts processing data through assigning it a security token, but then transforms in the course of execution to make the last progression a thread [4]. The threads can then be paused by the windows system user and be resumed, as a way of allowing the windows operating system to function efficiently. On the other hand, process management in Mac applies a different processing mode consisting of a Grand Central Dispatch that is comprised of a pool of the available processing threads [4]. The Mac system is designed to have its programs create blocks that carry within themselves the data and the codes on how the data should run. This way, it becomes possible for the Mac operating system to offer as much concurrency of data processing as possible, based on the thread capacity that is available at any particular time [5]. The created program blocks are aligned in queues, such that the Mac operating system dispenses these blocks on the basis of the first-in first-out basis of processing [4]. Through the application of the Grand Central Dispatch mode, the Mac operating systems automatically sizes the threads such that the performance of the Mac system is maximized, while at the same time reducing quantity of waiting/idle or competing threads [4]. Through the automatic sequencing of the threads pooling that is created by the Grand Central Dispatch of the Mac operating system, the processing of the data in the system becomes very efficient, compared to the processing that is driven manually [4]. Memory Management Memory management allows for the operating system within a computer to designate and allocate tasks, both virtual and physical, allowing the system to perform efficiently. The memory management in Windows operating system applies the virtual memory hardware for the recognition and blockage of suspicious programs that are not authorized by the user, which may contain harmful threads to the system [2]. Further, as a means of protecting the memory of the operating system, the Windows system virtual memory hardware codes the pages address spaces into a read-only mode, which helps to limit the modification of files in the system. Windows also use the user mode threads to enhance memory allocation to tasks, while also applying the file mapping system to allow for memory sharing [4]. Thus, memory sharing allowed by the Windows operating system makes it more vulnerable to security breaches and attacks, since intrusive and harmful programs can share in the memory address space assigned to another process, and expose it to harmful threads attack. On the other hand, Mac operating system applies executable codes for read-only memory as the means through which permission for programs access is granted, thus ensuring that files stored within the system cannot be corrupted [9]. Memory sharing in Mac operating system is highly limited, since the Mac operating system prevents users from accessing the same memory portion twice. Further, Mac operating system uses the kernel assignment system to assign each processing file its unique address space, and then limits the access of others into this address space [6]. Due to the prevention of memory sharing for different processing activities in Mac operating system, Mac system is able to deter the threats of harmful threads from suspicious programs more effectively, and thus secure the system from attacks. File Management File management refers to the system the operating system within a computer uses to organize files and then keep track of the files within the system. The Windows operating system applies two modes of file management systems. One mode of managing files within the Windows operating system is the File Allocation Table (FAT) system, which is limited both in its security enhancements as well as in the size of the storage. The FAT system is highly vulnerable to security breaches, since anyone who has access to the system can be able to read the files [7]. Additionally, FAT system has limited the partition size of the system to 32 GB, while also limiting the file size to 4 GB. The second mode of the Windows file management system is the New Technology File System (NTFS), which is a more advanced file management system that allows for a larger partition as well as for a larger storage space for files. Further, the NTFS for Windows keeps monitoring the disk-related errors automatically, while at the same time offering a far much better security control, due to requiring for permission to access the files stored in the system [8]. Additionally, the NTFS offers an encryption system that helps to secure files stored in the system, and thus ensure only authorized access. The windows operating system does not allow for users to change or edit files when they are open. Finding a file in Windows operating system applies a window search explorer. The Windows operating system also allow for resuming file access after a power outage or forceful reboot [4]. On the other hand, the Mac operating system applies the Standard HFS system of file management, which can take the form of standard HFS for the earlier versions of Mac, while the latest version applies either the HFS+ or the HFSX systems of managing files within the system [6]. The standard HFS system is compatible with all the Mac versions of operating systems, although it is highly disadvantaged by its limitation of the file name characters to only 31 characters, while also limiting the file size to only 2 GB. Further, the standard HFS places large volume spaces within the files, resulting in the wastage of disk space. On the other hand, the HFS+ is only compatible with the recent versions of the Mac operating system starting from the OS8.1 to, and allows more character file-naming limit [6]. In addition, the HFS+ is advantageous due to lack of any file size limitation, while also not utilizing wasting less disk volume [9]. The HFSX combines the features of the HFS+, and allows for sensitive file naming. The Mac operating system applies default saving of files, unless the user specifies where to save a file. Further the Mac operating system offers the read only, write only and the no access and the root ignore file permission systems, which offers better access control to file accessibility [6]. File location identification in Mac applies the finder, which can trace where a file has been saved easily. In addition, Mac operating system offers file editing or file changing options when the file is open. Conclusion In conclusion Mac operating system operates different from the Windows operating system. The two systems mainly differ in the memory management, data processing and file management. Windows allows for the sharing of memory between processing tasks which is no allowed in Mac system. Further, Windows allow resumption to the originally open files after a power outage or forceful booting. Windows also allows direct access to files to anyone capable of accessing the system, while the Mac system applies executable codes for read-only memory, which limits the immediate access to files in the system, unless permission is first sought. It is the sharing of memory characteristic, resumption to the originally open files and the allowing of direct access to files that makes Windows more prone to security breach threats, compared to Mac. References [1] D. Pogue. MAC OS X Snow Leopard The Missing Manual. Beijing: Pogue Press/OReilly, 2009. [2] Windows Microsoft (2014). [Online]. Available: http://windows.microsoft.com/en-us/windows/what-is-virtual-memory#1TC=windows-7 [3] D. Gibson. Microsoft Windows Security Essentials. Indianapolis, Ind: Wiley, 2011. [4] W. Stallings. (2012). Operating Systems: Internals and Design Principles. Boston, MA: Prentice Hall. [5] S. Yin. (2012). 8 Simple Tips for Mac Security. [Online]. Available: http://www.pcmag.com/article2/0,2817,2408621,00.asp [6] Mac Antivirus Software Review. (2014). In Top Ten Reviews [Online]. Available: http://mac-antivirus-software-review.toptenreviews.com/ [7] P. Chandna. (2012). Microsoft Security Essentials Flunks AV-TEST, Loses Certification. Maximum PC. [Online]. Available: http://www.maximumpc.com/article/news/microsoft_security_essentials_flunks_av-test_loses_certification419 [8] C. Corio. (2006). First Look: New Security Features in Windows. TechNet Magazine [Online]. Available: http://technet.microsoft.com/en-us/magazine/2006.05.firstlook.aspx [9] CNSA. Advances in Network Security and Applications 4th International Conference: CNSA 2011, Proceedings. New York: Springer-Verlag Inc, 2011. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Mac and Windows Security System Literature review Example | Topics and Well Written Essays - 1750 words, n.d.)
Mac and Windows Security System Literature review Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/1869754-mac-vs-windows-security
(Mac and Windows Security System Literature Review Example | Topics and Well Written Essays - 1750 Words)
Mac and Windows Security System Literature Review Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1869754-mac-vs-windows-security.
“Mac and Windows Security System Literature Review Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/1869754-mac-vs-windows-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mac and Windows Security System

Hacking of Computer Systems and Cyber Crimes

It is understood that computers that use Apple Inc's Mac OS X operating systems are equally vulnerable to hackers, just like the computers operating on Microsoft Corp's windows operating system.... hellip; Therefore, this paper aims to provide a summary of and a detailed review of two recent articles in the history of computers or computing; the articles are going to narrow down on the topic further, by focusing on hacking incidences and cyber security threats that have bedeviled leading companies such as Apple Inc in the recent past....
5 Pages (1250 words) Essay

Introductory Computer Usage 1

Software Express does have some software's for mac OS like web browsers, email, office suites, etc.... but you need to log into the university with registered user id and password.... Linux comes with the software's included with the OS CD as they are all under Open License Agreement. … DRM is removed to have access to original content and unencrypted media....
3 Pages (750 words) Essay

Why Apple Computer Is Better than Windows

Apple computers are not vulnerable to such insecurity threats because they have superior built-in security system than windows computers.... Below are some of the aspects of apple computers that make them the preferred… The first advantage of apple computers over windows computers is the operating system flexibility (Martin, 2008).... This is because you can legally install OS X or other operating system on an apple computer.... The first advantage of apple computers over windows computers is the operating system flexibility (Martin, 2008)....
2 Pages (500 words) Essay

Classification of the Applications

To make it work user should install little software on the desired device and it will wait for the remote signal and will activate the system to track the location of the device.... The paper "Classification of the Applications" presents that K-9 is the computer program designed to provide parental control and content limitation for the definite users....
4 Pages (1000 words) Assignment

WAN Technologies

nix is an old but popular multitasking operating system that is capable of supporting large network operations.... he userThe users need to use strong passwords and implement proper security policy to prevent leaking out passwords to UN authorized users who may use the passwords to access sensitive information in the system (Ray 2009).... ystem securityThe system security needs to be enhanced to ensure safe transmission of data between the client and the server....
2 Pages (500 words) Essay

The major operating system and network you are using on a daily basis

hellip; The major operating system most used on a daily basis on our desktop computers is the Microsoft Windows 8.... operating system (OS), the latest generation of the Microsoft Windows NT OS series.... 2011) The operating system and network are adequately designed and developed to perform their tasks in our environment.... other OS's (MNS Group, 2012) • Ability to be adapted and access to a wide support knowledge base to fix problems or issues A few highlighted disadvantages to the Windows OS are: • Vulnerability to frequent virus or security attacks....
4 Pages (1000 words) Essay

Computing and IT

nbsp;… The operating system also allocates memory to different programs, handles the priority of system interrupts, controls output, and negotiates with other computers in a network situation.... nbsp;The interface which is used to give commands to the operating system can be based on a command-line interface such as the one used by older operating systems such as DOS or it can be a modern graphics-based user interface such as the one used in Mac OS X....
5 Pages (1250 words) Assignment

Operating Systems - Types and Destination

The paper "Operating Systems - Types and Destination" explains that for a computer to run, it requires an operating system, and thus system developers like IBM, Microsoft, Google, and Apple have to come up with new versions of operating systems that meet the consumer requirements and low price.... hellip; Operating system (OS) is software that is used in computers to manage the hardware and the software so that they can work interactively without causing a halt to the computer....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us