Nonetheless, a small but significant increase in Linux adoption would probably result in safer computing for everyone, because in market share loss is one sure way to get Microsoft’s and Apple’s attention. And some of them are differentiated in ways that specifically address security concerns. With Linux v2.6, the security architecture is now modularized. Linux distributions provide all changes, which are applied to every package. Users are going to want a UI that seems familiar, and you are going to want the most secure OS. A variety of installation and configuration tools, e.g. Concentrating on it gives them the most bang for their efforts. Windows 98, Windows NT, Windows 2000, Windows 2003 Server, and Windows CE are just a subset of Microsoft’s offerings. Windows, for which no source code is available, does not enable equivalent transparency. The most security-conscious might have a security operations center. And if you did decide that Linux was the way to go, you would still have to decide which distribution of the Linux system to choose, and things get a bit more complicated there. Linux differs from Windows in providing a clear separation between kernel space and user space. We asked some experts what they think of the security of these three choices: Windows, the ever-more-complex platform that’s easily the most popular desktop system; macOS X, the FreeBSD Unix-based operating system that powers Apple Macintosh systems; and Linux, by which we mean all the various Linux distributions and related Unix-based systems. Users need to keep in mind that there are philosophical differences in the design of Linux and Windows. As the technical innovation of Linux and Windows continues, so will the discourse on which is more secure. built into the kernel, Snort, Apache, sendmail, Postfix, PKCS 11, One striking thing about the infestations was that I was never specifically targeted by the miscreants; nowadays, it’s as easy to attack 100,000 computers with a botnet as it is to attack a dozen. Windows, no specific hardening tool, admin GUI, security by The exec-shield patch also makes it more difficult to conduct a shell-code exploit. How secure an IT infrastructure is will vary not only based on the Linux distribution and Microsoft product and service pack deployed, but also by what patches customers choose to implement. The OS you deploy to your users does make a difference for your security stance, but it isn’t a sure safeguard. For one thing, a breach these days is more likely to come about because an attacker probed your users, not your systems. A survey of hackers who attended a recent DEFCON conference revealed that “84 percent use social engineering as part of their attack strategy.” Deploying a secure operating system is an important starting point, but without user education, strong firewalls and constant vigilance, even the most secure networks can be invaded. There are a number of advantages to UML, but the more compelling attribute is the ability to use it as a virtual machine. Also, with Linux there is often more flexibility to use either a GUI or the command-line to patch a system. Like many of you, I have firsthand experience of the threats that are out there: I have been infected by malware and viruses on numerous Windows computers, and I even had macro viruses that infected files on my Mac. UML will eventually lead to a fully virtualized environment for security infrastructure. handling, Trusted Platform Module, Trusted Computing Teach your users how to pick really good passwords and arm them with tools such as 1Password that make it easier for them to have different passwords on every account and website they use.