Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Các cuộc tranh luận về hệ điều hành nào là an toàn hơn đã được hoành hành trong nhiều năm. Unix là an toàn hơn Windows? Là Windows an toàn hơn Unix? Hệ điều hành được sử dụng cho ứng dụng quan trọng? Nếu bạn hỏi những câu hỏi của các chuyên gia bảo mật mười, bạn có thể nhận được câu trả lời mười khác nhau và bạn sẽ vẫn không có câu trả lời cắt rõ ràng. | APPENDIX B Unix vs. Windows Which Is More Secure Copyright 2001 The McGraw-Hill Companies Inc. Click Here for Terms of Use. 353 354 Network Security A Beginner s Guide The debate about which operating system is more secure has been raging for years. Is Unix more secure than Windows Is Windows more secure than Unix Which operating system should be used for mission-critical applications If you ask these questions of ten security professionals you are likely to get ten different answers and you will still not have a clear cut answer. An examination of both operating systems reveals that both have incorporated security into their designs. Both Unix and Windows have access control mechanisms authentication mechanisms and audit mechanisms. On the flip side both Unix and Windows are made up of many lines of code millions . There will certainly be bugs in that much code and some of those bugs will cause security problems. In the following sections we will take a look at various issues in the overall security debate. Hopefully by the time you reach the end of this section you will have a better understanding of the issue if not the solution . TIMES CHANGE The Internet has been around for a while. TCP IP was designed many years ago and Unix followed closely behind it. In fact the history of Unix and the history of the Internet are so intertwined that it is difficult to separate the two. Of course the security issues surrounding the Internet were not immediately apparent. It took a while for the Internet to grow into an online community where some of the inhabitants were not completely trustworthy. When these individuals tried to break into systems there was only one type of system to break into Unix. And so they did. At first the vulnerabilities that were used to gain access to systems were poor configurations and even poorer passwords. Mostly the attackers did not do bad things to the systems but rather they wanted to see what the systems could do. Regardless of that by the