Pick a topic from the links below:
https://www.nextlogik.com/which-mobile-os-is-most-secure-ios-android-or-windows-slideshare/
https://www.digitaltrends.com/computing/decrypt-os-security-showdown/
https://searchdisasterrecovery.techtarget.com/definition/Business-Continuity-and-Disaster-Recovery-BCDR
https://www.disys.com/news/the-difference-between-disaster-recovery-and-business-continuity-and-why-it-matters-for-both/
Write a literature review on it.
Security is an important issue for the computer and other similar system. The most significant thing in maintaining the security of the software depends on the security capability of the operating system used in the machine (Alves-Foss et al.,2014). The main objective of this paper is to evaluate different operating system on the basis of the security standards. The significant of discussion this topic is that recently most of the system are becoming the victim of cyber crime and data breaching. Operating system plays an important role in these cases. Selecting the right operating system will be beneficial for maintaining the security of the system.
It has been seen that the choosing the right operating system helps to mitigate the chances of external threats. This also helps to reduce the rate of cyber crime and data breaches. Different operating system software has different approaches towards maintaining the security of the system. Some of the operating system have inbuilt antivirus protection system. Some of the operating systems prevent the users from accessing malicious sites.
The improvement of the security of the operating system is done by adding additional features in the system (Ferdous & Shekhar, 2018). Different operating system has different features for maintaining the security in the system. In most of the cases, it has been seen that the operating system with high user rate are affected by the virus, ransom ware and other kind of cyber security attacks. While choosing the secured operating system, the flexibility of the respective operating system is needed to be considered.
The mechanism and different characteristics of different operating systems will help to understand the security vulnerabilities those can happen in case of operating system in the computer. The identification of the vulnerability will help to mitigate the security threats.
The discussion is regarding the security mechanisms of each operating system. This discussion will help to identify the best operating system with respect to security and flexibility. Some of the operating system in the discussion is well known operating system such as Windows, Linux and Mac OS.
The main advantage of Windows system is that it is the most stable operating system. However, there is lack of security in the system. Moreover, Windows is not providing security patches and upgrade for Windows XP. All these things are making this operating system prone to the cyber security attack. Linux operating system is good for the users with some programming knowledge (Chong, 2016). This can be an option for tailor made service through the operating system for the users. However, this operating system is open source so it is prone to the cyber attack. The Unix and Linux users were affected through the piece of code named Operation Windigo (Wessel et al.,2015). Another flaw in this operating system is holiday hampering Grinch Bug that affects the root level control of the operating system. Mac OS is a good choice as it provides sustainable operating system. Mac operating system can be considered as one of the safest operating system available nowadays (McBride, Arief & Hernandez-Castro,2018). The control of the manufacturing company Apple over the operating system is good. Chrome operating system can be considered as the newest operating system in the industry. From the security point of view this operating system is safe. However, the operating system is not flexible as it does not allow third party software installation for the security purpose. However, the market share of Chrome OS is small. In case, if the security is the prime concern Wrap Up operating system can be an option. OS X operated by Wrap Up is a modern operating system.
Analysis of the operating systems available in the market it can be said that no operating system is free from the cyber attack. Some of the operating system have better security management mechanism (Brookes & Taylor, 2016). However, it can be said that enhancing the degree of the security is not only the concern thing regarding this matter. The required flexibility of the operating system is also needed. It can be said the operating system which is popular and used by most of the users are prone to the cyber threats. In that case, the security specifications are needed to be enhanced in this type of operating system.
It can be concluded from the above discussion that the no operating system can provide full protection against cyber security threats. However, there are some of the operating systems that provide good security protection. Some of the operating system has lack of user flexibility which is not desirable. It has been seen that Windows is the mostly used operating system and is mostly affected by the cyber attacks. The popularity of the operating system also makes that operating system prone to the cyber threats. It can be said that every operating system has flaws and advantages; however, the security of the operating system is also dependent on the users and the way of the using of operating system.
Alves-Foss, J., Song, J., Steiner, S., & Zakeri, S. (2014). A new operating system for security tagged architecture hardware in support of multiple independent levels of security (mils) compliant system. IDAHO UNIV MOSCOW CENTER FOR SECURE AND DEPENDABLE SYSTEMS.
Brookes, S., & Taylor, S. (2016, September). Rethinking operating system design: Asymmetric multiprocessing for security and performance. In Proceedings of the 2016 New Security Paradigms Workshop (pp. 68-79). ACM.
Chong, S. (2016). Integrating Programming Language and Operating System Information Security Mechanisms. Harvard University Cambridge United States.
Ferdous, M. D., & Shekhar, N. (2018). Comparison on Booting process & Operating systems Features.
McBride, J., Arief, B., & Hernandez-Castro, J. (2018, February). Security Analysis of Contiki IoT Operating System. In Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks (pp. 278-283). Junction Publishing.
Wessel, S., Huber, M., Stumpf, F., & Eckert, C. (2015). Improving mobile device security with operating system-level virtualization. Computers & Security, 52, 207-220.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Operating Systems. Retrieved from https://myassignmenthelp.com/free-samples/cs401-operating-systems/the-victim-of-cyber-crime-and-data-breaching.html.
"Operating Systems." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/cs401-operating-systems/the-victim-of-cyber-crime-and-data-breaching.html.
My Assignment Help (2021) Operating Systems [Online]. Available from: https://myassignmenthelp.com/free-samples/cs401-operating-systems/the-victim-of-cyber-crime-and-data-breaching.html
[Accessed 15 April 2021].
My Assignment Help. 'Operating Systems' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/cs401-operating-systems/the-victim-of-cyber-crime-and-data-breaching.html> accessed 15 April 2021.
My Assignment Help. Operating Systems [Internet]. My Assignment Help. 2021 [cited 15 April 2021]. Available from: https://myassignmenthelp.com/free-samples/cs401-operating-systems/the-victim-of-cyber-crime-and-data-breaching.html.
Getting nightmare regarding pending chemistry assignment? Then it is high time you consider hiring chemistry assignment help service of MyAssigemnthelp.com. We at MyAssignmenthelp.com deliver quality subject specific assistance on more than 100+ subjects. For us, students' need is foremost, and we work round the clock to offer science, humanities and commerce assignment help. Among Commerce wing, our one of the most popular services is capital budgeting assignment help. In science segment, we have gained popularity with biology assignment help.
Answer: Introduction: As a fresh graduate in computer technology, getting a chance to enrol myself in the learning course of computer networking and administration of the University of Bedfordshire. Computer networking have been my topic of interest since I enrolled myself for graduation in computer science. The career path was clear for me and it led to the post of network administrator to one of the most esteemed companies in United K...
Read MoreAnswer: The main purpose of behind the selection of the resource is that it gives information related to the different types of processing units such as the CPU and GPU. The functionalities of each of those processing units are described briefly in the resource which helps in understanding their difference and their applications. The resource provides in depth knowledge about the differences between the two processing units and also states abo...
Read MoreAnswers: 1: Definition of ICT ICT is referred as information communication technology that enables the unified communication. The main objective of the ICT is to implement the system which is helpful to make the communication between the telecommunication devices and the computers (Cancian, Rabelo and von Wangenheim, 2015: 634-659). The field of ICT is broad as it covers the method of creation, modification and manipulation of the data electr...
Read MoreAnswer: According to Gope, & Hwang, (2016), IoT (Internet of Things) denotes to a computing concept that everyday physical object is being connected to the Internet and having the capability to identify themselves with other computing devices. In fact, every industry is craving for IoT in order for it to survive in the present competitive world. Healthcare sector, therefore, is no exception to be singled out in this area. It should be not...
Read MoreAnswer: Introduction The hospitality industry can be defined as the broad group of businesses that offer varied services to the customers. The uniqueness of hospitality industry lies in the fact that it is heavily dependent on discretionary income and free time (Ryan, 2015). It is a multibillion dollar industry which has three primary areas namely accommodations (such as hotels and other lodging businesses), food and beverage (such as f...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Thank you so much for your support and quick turn around. I really appreciate it.
Australia
Excellent service. First I had an inconvenience with my assignment but it was quickly sorted out within 24 hours of me reporting it and was giving an excellent paper. Perfect wording and citation. Just remember that these are human being that are wor...
Australia
I have been using myassignment help for over 2 years now and I continue to be impressed with their quality of work, on point turn around time for assignments and professionalism with customer service. No dissapointments so far. Keep up the good work...
Australia
i ask to redo the work and the exert did a great job correcting and redoing it. Thank you sooooo much
Australia