Sign In
Not register? Register Now!
You are here: HomeEssayIT & Computer Science
Pages:
2 pages/≈550 words
Sources:
4 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Analysis (Essay Sample)

Instructions:
The purpose of this assignment is to do statistical analysis to see which operating system is considered the most secure based on vulnerability scores. Your analysis will consider a website provided, as well as other original resources you find. The outcome is to have a better understanding of operating systems and the existing vulnerabilities and what must be done to secure our environment. source..
Content:
Operating Systems Analysis-Microsoft, Apple, and Linux Department name, Institution name Course number: Course name Instructor’s name Due date Operating Systems Analysis-Microsoft, Apple, and Linux The operating system is a core computer security component, and evaluating and constantly strengthening its security to resist attacks and vulnerabilities is a mandatory need, as there are many weaknesses that cybersecurity experts discover (Kaluarachchilage et al., 2020, p.1). The paper will conduct a statistical analysis to evaluate the operating system that is most secure based on the vulnerability scores. The analysis uses https://www.cvedetails.com/top-50-vendor-cvssscore-distribution.php and other sources to understand better the operating systems (OS) and their current vulnerabilities and measures that can make the OSs more secure. The total number of vulnerabilities is 9285, 5979, and 3097 for Microsoft, Apple, and Linux operating systems, respectively (“CVSS Score Distribution", n.d., p.1). The figures show that Microsoft OS has the highest number of weaknesses, followed by Apple and Linux (Ubuntu). All Linux distributions, such as Ubuntu, are open source and free; thus, users can install them and even modify them to put more security features on the operating system reducing the risk associated with their use. On the hand, there is a high risk in using Microsoft and attackers or adversaries can install malicious software or virus to steal users' private information or disrupt some of its core functionalities like making the operating system not support popular and required applications (Awan & Khan, 2022, p.46). Apple possesses a relatively high rate of weaknesses as compared to Microsoft. Employee Knowledge of the System Employee knowledge of the operating system is a core consideration since employees find it challenging to use a complex operating system because of the technical skills, such as writing commands to operate it they required. For instance, 54.5 percent of users are running windows, 27.3% are using Linux, while only 18.2 percent have Apple as their operating system as per Windows Vs. Linux Survey (Awan & Khan, 2022, p.49). Consequently, many people have a good understanding and knowledge of Microsoft; thus, they can install and manage it easily and effectively compared to other operating systems. Therefore, many employees know how to use Microsoft due to its excellently designed user interface, making it widely used. Total Cost of the System Windows prices its license for the Pro version at $199.99, which suites businesses or large enterprises that need a faster and more powerful operating system (Awan & Khan, 2022, p.46). Linux is open source; thus, it is free. MacOS cost is included in the price of the Mac computer. Therefore, cost-wise, Linux distribution like Ubuntu is less expensive, and organizations can use it if they need an open-source and free operating system. Total Cost to Secure the System The total price for securing an operating system is a vital consideration since there more secure a system is, the more resources the company needs to monitor and maintain it. MacOS and Linux are more expensive than Linux regarding the total securing cost since attackers popularly attack them. Consequently, requiring more advanced security functionalities. Ethical Issues Some ethical issues to consider before using any operating system include using data for an unintended purpose. All three OSs possess policies protecting users' data and not using customers' personal information without their consent. Additionally, some experienced computer us...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • IT teamwork
    Description: IT teamwork IT & Computer Science Essay...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • Article Summary
    Description: Article Summary IT & Computer Science Essay...
    1 page/≈275 words| 1 Source | APA | IT & Computer Science | Essay |
  • Foundation (CSS Framework)
    Description: Foundation (CSS Framework) IT & Computer Science Essay...
    7 pages/≈1925 words| 12 Sources | APA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!