Abstract

Security is a major concern in all computing environments. One way to achieve security is to deploy a secure operating system (OS). A trusted OS can actually secure all the resources and can resist the vulnerabilities and attacks effectively. In this paper, our contribution is twofold. Firstly, we critically analyze the host vulnerabilities in modern desktop OSs. We group existing approaches and provide an easy and concise view of different security models adapted by most widely used OSs. The comparison of several OSs regarding structure, architecture, mode of working, and security models also form part of the paper. Secondly, we use the current usage statistics for Windows, Linux, and MAC OSs and predict their future. Our forecast will help the designers, developers and users of the different OSs to prepare for the upcoming years accordingly.

Highlights

  • In today’s world, information security is very important

  • The operating system is the one which coordinates amongst all the other systems

  • We believe that the choice of an operating system (OS) solely depends on the user requirement

Read more

Summary

INTRODUCTION

In today’s world, information security is very important. It can relate to our national policy, civilization, economy, and military affairs, etc. There is a growing trend that more users pay attention and respond to different executable codes that are present on the Internet. If these executable codes are directed from unauthorized sources or infected by viruses, execution of such files can bring the system security at high risks [2]. Everyone uses smartphones, desktop computers or laptops in their routine tasks In this case, these systems are handling different environments like web browsing. The existing research does not provide critical analysis and comparison of different desktop OSs and the tools that can make an OS more secure.

OPERATING SYSTEM SECURITY MECHANISM
Security Methods
Quantifying Risks
Windows Operating System
MODULES AND TECHNIQUES FOR OS SECURITY
Solaris Operating System
Macintosh Operating System
Findings
DISCUSSION AND OPEN
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.