Abstract
Security is a major concern in all computing environments. One way to achieve security is to deploy a secure operating system (OS). A trusted OS can actually secure all the resources and can resist the vulnerabilities and attacks effectively. In this paper, our contribution is twofold. Firstly, we critically analyze the host vulnerabilities in modern desktop OSs. We group existing approaches and provide an easy and concise view of different security models adapted by most widely used OSs. The comparison of several OSs regarding structure, architecture, mode of working, and security models also form part of the paper. Secondly, we use the current usage statistics for Windows, Linux, and MAC OSs and predict their future. Our forecast will help the designers, developers and users of the different OSs to prepare for the upcoming years accordingly.
Highlights
In today’s world, information security is very important
The operating system is the one which coordinates amongst all the other systems
We believe that the choice of an operating system (OS) solely depends on the user requirement
Summary
In today’s world, information security is very important. It can relate to our national policy, civilization, economy, and military affairs, etc. There is a growing trend that more users pay attention and respond to different executable codes that are present on the Internet. If these executable codes are directed from unauthorized sources or infected by viruses, execution of such files can bring the system security at high risks [2]. Everyone uses smartphones, desktop computers or laptops in their routine tasks In this case, these systems are handling different environments like web browsing. The existing research does not provide critical analysis and comparison of different desktop OSs and the tools that can make an OS more secure.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.