Ergebnis für URL: http://www.esecurityplanet.com/views/article.php/3665801 #[1]eSecurity Planet » Feed [2]alternate [3]alternate [4]alternate
IFRAME: [5]https://www.googletagmanager.com/ns.html?id=GTM-PHQ8H39
* [6]Facebook
* [7]LinkedIn
* [8]Twitter
[9]eSecurity Planet
Search
____________________ (BUTTON) Search
(BUTTON)
(BUTTON)
* [10]Best Products (BUTTON)
+ [11]Cybersecurity Companies
+ [12]Vulnerability Management
+ [13]EDR
+ [14]NGFW
+ [15]IAM
+ [16]CASB
+ [17]Intrusion Detection and Prevention
+ [18]Threat Intelligence
+ [19]SIEM
+ [20]Network Access Control
+ [21]UEBA
+ [22]Governance, Risk & Compliance
+ [23]Web Application Firewall
* [24]Networks (BUTTON)
+ [25]What is Network Security?
+ [26]How to Secure a Network
+ [27]Network Security Threats
+ [28]Network Security Tools
* [29]Cloud
* [30]Threats
* [31]Trends
* [32]Endpoint
* [33]Applications
* [34]Compliance
Search
____________________ (BUTTON) Search
Linux vs. Windows: Which is Most Secure?
[35]Kenneth van Wyk
March 16, 2007
* [36]Facebook
* [37]Twitter
* [38]LinkedIn
* [39]Email
* [40]Print
eSecurity Planet content and product recommendations are editorially independent.
We may make money when you click on links to our partners. [41]Learn More.
Editor's Note: A lot has changed since this article was written so we decided to
take another look at the topic. Check out the new article, [42]Is Linux Really
More Secure than Windows?, to see what the findings are ... you might be
surprised (or not).
I'm more secure on Linux than I am on Windows. Yup, that's right. I have no doubt
whatsoever that I am.
I started down this path by comparing how secure I am on a Mac vs. on Windows,
then I compared [43]Mac vs. Linux. To complete that trifecta, I guess it's only
fair to compare the end-user data security aspects of Windows against Linux.
Before I get into my rationale, though, just a little more background is in
order. I started using a UNIX desktop way back in college and was always
comfortable there. At my first couple of jobs after college, I mostly used UNIX
workstations from Dec and Sun as my primary desktops.
Later, I started using Windows-based systems at the office, but never felt quite
at home. I was constantly frustrated by the frequent reboots, lack of serious
security capabilities (from my perspective), and such. Then, following a brief
foray in OS/2, I quickly gravitated to running Linux at home so I could once
again have a real multi-tasking working environment.
Nowadays, my primary desktop is on a Macbook Pro - the best computer I've ever
owned, without any doubt.
But, I still run a Debian Linux infrastructure for my company, with a couple
Samba servers at its core. It's not uncommon for the Linux systems to go over a
year in between reboots. And, I still use XP on another laptop from time to time,
generally when a customer requires it or I absolutely must run something like
ActiveX controls on a web site. I try my best to learn how to best use the
security features of each OS I use, naturally.
So, with that background in mind, it's clear my views are somewhat biased.
However, I consider myself very open-minded and will always give credit where
it's due. Heck, some of my best friends use Windows (but I do my best to talk
them into OS X anyway).
o True to UNIX.It's tough to be entirely fair here, since Windows isn't UNIX in
any sense. But my point here is that Linux does follow the security features and
capabilities it inherited from UNIX quite closely. In particular, the notion of
an administrative (root) user that maintains and operates the system, and desktop
users who only run the software on the system, is completely ingrained in most
Linux distributions.
Now it's true that many Linux users ignore these features and run all their
software from a root-level account anyway, but that's a choice that they've made.
The system defaults to protecting the operating system components from its user's
actions (intentional or otherwise). That feature alone must account in large
degree for the dearth of viruses and other malicious vermin on Linux and UNIX
platforms.
Windows, on the other hand, started life as a single user system, with that
single user being all-powerful. Although that's no longer the case, the general
attitude can still be found in many Windows-based software products - many of
which just can't be installed and/or run properly without desktop administrator
privileges. This is all changing for the better, but it took Microsoft far too
long to adopt this default-secure configuration practice.
Qualitative score: Windows gets a D+ while Linux gets an A-.
o "Bummer of a birthmark"Many of us no doubt remember Gary Larson's Far Side
comic strip in which two deer are standing around, and one of the deer has a big
bulls-eye target on his chest... You get the picture.
Well, in many ways, that's the sad state of affairs for Windows users these days.
It's true that phishers, virus writers, and other miscreants could target other
operating systems, but by and large they don't.
As other operating systems gain market share, that's likely change, but by my
thinking, Linux isn't going to be the next big target. So, until and unless that
target "birthmark" finds its way onto another victim, it's "bummer of a
birthmark" time for Windows users. (Hint: the "birthmark" itself is your
Outlook/Internet Explorer combination!)
Qualitative score: Windows gets an F while Linux gets an A.
o User data confidentiality. All those commands that I grew comfortable with on
UNIX (e.g., chmod, chown, umask) for protecting or sharing my data are in Linux
and are easy for me to work with. Although the features are relatively on the
light side as industrial strength file access control goes, the tools and
capabilities are readily available and they work pretty darned well.
While it's true that Windows has equivalent commands and GUI interfaces for
protecting one's data, I've always found them to be awkward at best, and
generally defaulting to open (world read-write) unless I go out of my way to lock
down my own files.
Now, to be fair, I have to point out that the Windows NTFS file system has a
phenomenally powerful set of features when it comes to file/directory access
control and auditing. Indeed, when used properly, an NTFS file system can be very
tightly configured to the needs of a user or application. The problem is that so
few people do it or even know how to do it.
One other factor here is the availability of third-party file and disk encryption
products. Here Windows clearly has the upper hand, and I'm noticing more and more
corporate laptops employing disk encryption as a standard configuration item. (I
guess we can thank the likes of the U.S. Veterans Administration for that.)
Qualitative score: Windows gets a B- while Linux gets a B+.
o Patch practices. Here Windows shines (finally). With Windows Updatebeing
readily available and running by default as of XP SP2, things are finally looking
up for Windows users. From the perspective of an end-user seeking to keep his
computer up to date with the current vendor-supplied security patches, Windows
sure does make things easy.
Linux isn't too far in the distance, though. Most Linux distributions do a
respectable job at automated security patch management. Many are opt-in, however,
and the interface varies from one distribution to the next, making it a bit less
easy to do things properly for a typical end-user.
The elapsed time from notification to patch, on the other hand, can vary
substantially. Overall, and again from a highly subjective viewpoint, I give a
slight edge to Linux, but I do feel that Microsoft has made great advances in the
past few years.
Qualitative score: Windows gets an A- while Linux gets a B+.
With these scores in mind, I have absolutely no doubt that my data is safest on a
Linux system than on a Windows system. And that ends my three-way comparison of
the user-level security in OS X, Windows, and Linux. I've tried to be as fair as
I can, and have given credit where each is worthy of it - and wrath where it's
not.
My overall winner remains Apple's OS X, which offers the best of both worlds
(UNIX and Windows-like) to me. I have the native desktop apps that I need to do
business, and underneath it all is the familiar face of UNIX. I'm at $HOME.
In closing, I should also say that a person determined to keep her data secure
can certainly use any of these three operating systems successfully. There's
enough good in the worst of them (and bad in the best of them) that what matters
most is really learning how to use all the security capabilities of the OS you're
most comfortable with.
Get the Free Cybersecurity Newsletter
Strengthen your organization's IT security defenses by keeping up to date on the
latest cybersecurity news, solutions, and best practices. Delivered every Monday,
Tuesday and Thursday
Email Address ____________________
[ ] By signing up to receive our newsletter, you agree to our Terms of Use and
Privacy Policy. You can unsubscribe at any time.
(BUTTON) Subscribe
Previous article
[44]Mac vs. Linux: Which is More Secure?
Next article
[45]Email Administrator Best Practices
[46]Kenneth van Wyk Avatar
[47]Kenneth van Wyk
Kenneth R. van Wyk is an internationally recognized information security expert
and author of the O'Reilly and Associates books Incident Response and Secure
Coding. In addition to providing consulting and training services through his
company, KRvW Associates, LLC, he currently holds numerous positions--the
Director of Cigital's Research Labs, monthly columnist for online security portal
eSecurityPlanet, and Visiting Scientist at Carnegie Mellon University's Software
Engineering Institute.
Subscribe to Cybersecurity Insider
Strengthen your organization's IT security defenses by keeping abreast of the
latest cybersecurity news, solutions, and best practices.
Email Address
____________________
[ ]
By registering, you agree to the Terms of Use and acknowledge the data practices
outlined in the Privacy Policy. You may unsubscribe from these newsletters at any
time.
(BUTTON)
Subscribe
Search
____________________ (BUTTON)
IT Security Resources
*
[48]Cybersecurity Management Lessons from Healthcare Woes
May 30, 2024
AI-generated image of healthcare cross icon on cyberspace.
*
[49]What Is Cloud Security Management? Types & Strategies
May 30, 2024
Abstract glowing shield with cloud icon on dark binary code background.
*
[50]Top 6 Database Security Solutions Available in 2024
May 30, 2024
Virtual shield with keyhole on abstract digital cyberspace background.
*
[51]Top 6 Managed Detection & Response (MDR) Providers in 2024
May 29, 2024
Cyberthreat hunting concept illustration.
Top Cybersecurity Companies
Top 10 Cybersecurity Companies
* 1 [52]ManageEngine Log360
* 2 [53]Dashlane
[54]See full list
Get the Free Newsletter!
Subscribe to Cybersecurity Insider for top news, trends & analysis
Email Address ____________________
[ ] By signing up to receive our newsletter, you agree to our Terms of Use and
Privacy Policy.
(BUTTON) Subscribe
Related Articles
* Illustration of a wifi icon on a virtual circuit grid.
[55]Wireless Network Security: WEP, WPA, WPA2 & WPA3 Explained
[56]Trends
April 29, 2024
* Microphone with waveform on purple background.
[57]8 Binge-Worthy Cybersecurity Podcasts in 2024
[58]Trends
April 26, 2024
* Featured graphic for HackerGPT.
[59]HackerGPT 2.0 Unveils New AI Cyber Defense Strategies
[60]Trends
March 15, 2024
(BUTTON)
eSecurity Planet is a leading resource for IT professionals at large enterprises
who are actively researching cybersecurity vendors and latest trends. eSecurity
Planet focuses on providing instruction for how to approach common security
challenges, as well as informational deep-dives about advanced cybersecurity
topics.
* [61]Facebook
* [62]LinkedIn
* [63]Twitter
Advertisers
Advertise with TechnologyAdvice on eSecurity Planet and our other IT-focused
platforms.
[64]Advertise with Us
Menu
* [65]Privacy Policy
* [66]Terms
* [67]About
* [68]Contact
* [69]Advertise
* [70]California - Do Not Sell My Information
Our Brands
* [71]Privacy Policy
* [72]Terms
* [73]About
* [74]Contact
* [75]Advertise
* [76]California - Do Not Sell My Information
Property of TechnologyAdvice.
© 2024 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from
companies from which TechnologyAdvice receives compensation. This compensation
may impact how and where products appear on this site including, for example, the
order in which they appear. TechnologyAdvice does not include all companies or
all types of products available in the marketplace.
×
References
Visible links:
1. https://www.esecurityplanet.com/feed/
2. https://www.esecurityplanet.com/wp-json/wp/v2/posts/7533
3. https://www.esecurityplanet.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows%2F
4. https://www.esecurityplanet.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows%2F&format=xml
5. https://www.googletagmanager.com/ns.html?id=GTM-PHQ8H39
6. https://www.facebook.com/eSecurityPlanetcom-201643516537315/
7. https://www.linkedin.com/company/esecurity-planet/
8. https://twitter.com/eSecurityPlanet?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor
9. https://www.esecurityplanet.com/
10. https://www.esecurityplanet.com/products/
11. https://www.esecurityplanet.com/products/top-cybersecurity-companies/
12. https://www.esecurityplanet.com/products/vulnerability-management-software/
13. https://www.esecurityplanet.com/products/edr-solutions/
14. https://www.esecurityplanet.com/products/top-ngfw/
15. https://www.esecurityplanet.com/products/best-iam-software/
16. https://www.esecurityplanet.com/products/casb-security-vendors/
17. https://www.esecurityplanet.com/products/intrusion-detection-and-prevention-systems/
18. https://www.esecurityplanet.com/products/threat-intelligence-platforms/
19. https://www.esecurityplanet.com/products/siem-tools/
20. https://www.esecurityplanet.com/products/network-access-control-solutions/
21. https://www.esecurityplanet.com/products/best-user-and-entity-behavior-analytics-ueba-tools/
22. https://www.esecurityplanet.com/products/grc-tools/
23. https://www.esecurityplanet.com/products/top-web-application-firewall-waf-vendors/
24. https://www.esecurityplanet.com/networks/
25. https://www.esecurityplanet.com/networks/network-security/
26. https://www.esecurityplanet.com/networks/how-to-secure-a-network/
27. https://www.esecurityplanet.com/networks/network-security-threats/
28. https://www.esecurityplanet.com/networks/types-of-network-security/
29. https://www.esecurityplanet.com/cloud/
30. https://www.esecurityplanet.com/threats/
31. https://www.esecurityplanet.com/trends/
32. https://www.esecurityplanet.com/endpoint/
33. https://www.esecurityplanet.com/applications/
34. https://www.esecurityplanet.com/compliance/
35. https://www.esecurityplanet.com/author/kenneth-van-wyk/
36. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows%2F&t=Linux%20vs.%20Windows%3A%20Which%20is%20Most%20Secure%3F%20%7C%20eSecurity%20Planet
37. https://x.com/intent/tweet?text=Linux%20vs.%20Windows%3A%20Which%20is%20Most%20Secure%3F%20%7C%20eSecurity%20Planet&url=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows%2F
38. https://www.linkedin.com/shareArticle?url=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows%2F&title=Linux%20vs.%20Windows%3A%20Which%20is%20Most%20Secure%3F%20%7C%20eSecurity%20Planet&summary=A%20point%20by%20point%20comparison%20of%20the%20two%20OSes%2C%20with%20a%20subjective%20conclusion%20as%20to%20which%20offers%20better%20security.%20Plus%3A%20some%20thoughts%20on%20Apple%20security.&mini=true
39. mailto:?subject=Linux%20vs.%20Windows%3A%20Which%20is%20Most%20Secure%3F%20%7C%20eSecurity%20Planet&body=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows%2F
40. https://www.esecurityplanet.com/trends/linux-vs-windows/
41. https://www.esecurityplanet.com/editorial-policy/
42. https://www.esecurityplanet.com/features/article.php/3933491/Is-Linux-Really-More-Secure-than-Windows.htm
43. https://www.esecurityplanet.com/trends/mac-vs-linux/
44. https://www.esecurityplanet.com/trends/mac-vs-linux/
45. https://www.esecurityplanet.com/mobile/email-administrator-best-practices/
46. https://www.esecurityplanet.com/author/kenneth-van-wyk/
47. https://www.esecurityplanet.com/author/kenneth-van-wyk/
48. https://www.esecurityplanet.com/threats/cybersecurity-lessons-from-security-breaches-in-healthcare/
49. https://www.esecurityplanet.com/cloud/cloud-security-management/
50. https://www.esecurityplanet.com/products/database-security-tools/
51. https://www.esecurityplanet.com/products/top-mdr-solutions/
52. https://link.technologyadvice.com/37318448-c229-4c45-9423-8fdbc4f43820?country=DE&targeting_set_uuid=91ce16bc-5d5e-47c7-b28b-695df2015356&position=1&placement=sidebar&layout=vertical&source=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows&auid=50b19842-3f62-45af-ab81-96736ca092e6&
53. https://link.technologyadvice.com/69fb0c5d-7b58-4b72-9f54-e7cfc3bbdbe2?country=DE&targeting_set_uuid=7c88d8f3-ff15-4aa0-95ac-b060f9da2bf9&position=2&placement=sidebar&layout=vertical&source=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows&auid=50b19842-3f62-45af-ab81-96736ca092e6&
54. https://esecurityplanet.com/products/top-cybersecurity-companies/
55. https://www.esecurityplanet.com/trends/the-best-security-for-wireless-networks/
56. https://www.esecurityplanet.com/trends/
57. https://www.esecurityplanet.com/trends/top-cybersecurity-podcasts/
58. https://www.esecurityplanet.com/trends/
59. https://www.esecurityplanet.com/trends/hackergpt/
60. https://www.esecurityplanet.com/trends/
61. https://www.facebook.com/eSecurityPlanetcom-201643516537315/
62. https://www.linkedin.com/company/esecurity-planet/
63. https://twitter.com/eSecurityPlanet?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor
64. https://solutions.technologyadvice.com/advertise-on-esecurity-planet/?utm_source=esecurityplanet&utm_medium=portfolio_footer&utm_campaign=advertise_button
65. https://www.esecurityplanet.com/privacy-policy/
66. https://technologyadvice.com/terms-conditions/
67. https://www.esecurityplanet.com/about/
68. https://technologyadvice.com/contact-us/
69. https://solutions.technologyadvice.com/advertise-on-esecurity-planet/?utm_source=esecurityplanet&utm_medium=portfolio_footer&utm_campaign=advertise_contact-us
70. https://technologyadvice.com/privacy-policy/ccpa-opt-out-form/
71. https://www.esecurityplanet.com/privacy-policy/
72. https://technologyadvice.com/terms-conditions/
73. https://www.esecurityplanet.com/about/
74. https://technologyadvice.com/contact-us/
75. https://solutions.technologyadvice.com/advertise-on-esecurity-planet/?utm_source=esecurityplanet&utm_medium=portfolio_footer&utm_campaign=advertise_contact-us
76. https://technologyadvice.com/privacy-policy/ccpa-opt-out-form/
Hidden links:
78. https://www.esecurityplanet.com/
79. https://www.esecurityplanet.com/trends/the-best-security-for-wireless-networks/
80. https://www.esecurityplanet.com/trends/top-cybersecurity-podcasts/
81. https://www.esecurityplanet.com/trends/hackergpt/
82. https://www.esecurityplanet.com/
83. https://technologyadvice.com/
84. https://datamation.com/
85. https://webopedia.com/
86. https://enterprisenetworkingplanet.com/
87. https://eweek.com/
88. https://project-management.com/
89. https://serverwatch.com/
90. https://itbusinessedge.com/
Usage: http://www.kk-software.de/kklynxview/get/URL
e.g. http://www.kk-software.de/kklynxview/get/http://www.kk-software.de
Errormessages are in German, sorry ;-)