Windows and linux security

Is Linux more secure than Windows?

While neither Linux or Windows can claim to be 100% bulletproof, the perceived wisdom is that Linux is more secure than Windows. We try to find out if that’s the case.


By Olga Apostolova January 22, 2020 35414 views

Not that long ago hackers were not sophisticated or organized in criminal networks and all operating systems were reasonably secure.

Fast-forward a few years, stealing data has turned into a business, and security is on everyone’s mind. So a good time, then, to investigate if the niche operating system Linux is more secure than the most widely used one, Windows.

How secure is Windows?

Indeed, recently, Microsoft introduced a massive improvement to its operating system’s codebase. They added their own antivirus software system, improved firewalls and implemented a sandbox architecture, limiting programs from accessing the memory space of the OS or other applications.

Still, Windows is in a tight spot.

As you might expect, the volume of malware developed for an operating system is proportionate to its popularity. Windows has a large market share and because of that, it is a bigger target for scammers. Compared to that, there’s barely any malware in existence for Linux. That’s one reason some consider Linux more secure than Windows.

In addition, many believe that Windows architecture makes it a little easier for users to download malware compared to Linux. On Windows, all you need to do for viruses and spyware to run is to double-click on an “.exe” file.

When we asked Vivaldi devs to verify this statement, they told us that there are some safeguards against that.

By default, current versions of Windows will warn you if you download an “.exe” from the Internet using a technique called “ Mark of the Web ” (that’s as long as your browser correctly marks it as a download).

There are also various executable signing options to make sure that “.exe” files come from a trusted source.

However, by default, that protection is not set to a high enough level, since unsigned applications can still run. In contrast, freshly downloaded executables are treated as dangerous, and Windows 10 makes you perform actions on warning dialogs before they will run.

This “weakness” of Windows architecture might be why some consider Linux more secure than Windows. And also why Windows users are constantly prompted to download updates to their antivirus application and firewall software. This was indeed the case with the very recent software update to fix an issue flagged by the NSA that could allow attackers to successfully spoof code-signing certificates and use them to sign malicious code or intercept and modify encrypted communications.

Still, not all malware developed for Windows will run on all Windows devices. For example, a virus built for XP may not run on Windows 10. This makes it harder for malware developers who have to keep up with the ever-changing platforms.

Is Linux more secure by design?

Many believe that, by design, Linux is more secure than Windows because of the way it handles user permissions.

The main protection on Linux is that running an “.exe” is much harder. Linux does not process executables without explicit permission as this is not a separate and independent process. You’ll have to chmod +x a file before you can run it.

However, that’s changing. More and more Linux systems simplify things by understanding file extensions (double-click an .html file, and it will open a browser), so users are now relying on the security of every application. That means that an exploit in an image viewer can become a system exploit if you can get the user to double click on a .jpg

An advantage of Linux is that viruses can be more easily removed. On Linux, system-related files are owned by the “root” superuser. If infected, viruses can be easily removed as they can only affect the user account where they were installed, and they do not affect the root account (if the computer has one – Ubuntu does not normally use a root account, most other Linuxes do).

On the downside, Linux has been very slow to fix these “privilege escalation bugs” and there have been some from time to time. Because they can only be used by a local user account, they are not considered as serious as a remote exploit.

However, Vivaldi devs reckon that once the malware is running locally, it can use them to become root and remove all of that permissions protection. Being able to compromise a user account can be just as bad as being able to compromise a root account.

Linux has more things going for it though.

It has a large community of developers reviewing its code and making sure there are no back doors. Some have called Linux the most secure OS simply on the grounds of its large “team” of Linux user-developers around the globe.

The diversity of Linux distributions (as opposed to the relative monoculture on Windows) is another shield for Linux users.

Читайте также:  Драйвера для видеокарты ati radeon hd 4650 для windows 10

Some of these distributions have been built specifically around security. Edward Snowden, for example, has endorsed Qubes OS saying that if you’re serious about security, Qubes OS is the best operating system available today and that it’s what he uses.

Some Linux distributions have been accused of bad security practices but assuming your chosen distro (Ubuntu, Red Hat, Qubes OS, others ) has a good reputation for security, you can use it safe in the knowledge that it has all the necessary security patches applied.

All this is not to say that Linux machines cannot be infected (remember the Heartbleed bug in 2014), it’s just harder to do. That (and the cost probably) is the reason most of the web runs on Linux servers.

Security beyond the operating system

So is Linux more secure than Windows? Asking Vivaldi devs didn’t get us a conclusive answer.

Indeed, as no operating system is bulletproof, the only reasonable answer is to get educated about the security threats you face.

Deploying a secure operating system is an important step but lack of knowledge can expose you to far greater risks.

Here are a few things to think about:

  • Networking . Having a firewall is extremely important on both Windows and Linux. Make sure you know how that side of things works on your machine.
  • Phishing . This threat is the hardest to prevent as anyone can be tricked into disclosing a username, password, or other sensitive stuff. Beware that “social engineering” is the preferred method for a huge chunk of scammers. By sending emails posing as PayPal or Netflix, they will try to steal your passwords and, consequently, credit card information.
  • Choice of browser . Your choice of OS won’t protect you from phishing attacks but your browser might . Many browsers check for known malicious websites or websites that offer malware for download. For example, Vivaldi will ask you explicitly if you want to run an executable file.
  • Malware . When shopping around for software, you can be tricked into downloading and running suspicious software, extensions, or plug-ins that open the door to malware. Before installing anything on your machine, look up reviews, check if the software is used by a respectable number of people, as well as install it in a sandbox. And keep it updated! On Linux, stick to trusted repositories or download from official and trusted sites (e.g. download Vivaldi browser from vivaldi.com).

What are your thoughts on this? Is one OS more secure than the other? Is Linux more secure than Windows?

The good news is that no matter which OS you go for, Vivaldi is out there for you. It is also available for Mac, and a beta version is available for Android devices. We’ve got you covered!

Источник

Differences Between Linux Security and Windows Security

The differences in security between Linux and Windows are complex; Youssef Bassil of the Lebanese Association for Computational Sciences spent nine pages detailing the differences in his article «Windows And Linux Operating Systems From A Security Perspective» for the Journal of Global Research in Computer Science. (Link in Resources.) The security differences between the two operating systems can be broken down into simpler concepts by taking out of account the elements that do not affect most casual computer and Internet users.

Modularity and User Privileges

Windows is not modular; you may have noticed that when one part of your computer goes bad, the whole thing goes down like a house of cards. When all of an operating system’s components wind together, it becomes easier from malware to get from your mail client to your system files. Unlike Windows accounts, Linux user accounts typically do not have root access, which is required to make major changes to the system. If malware gets into the system, it has no way to spread without that access.

Automated Functions

Most users just want their computer to work, without having to spend too much time configuring files and solving technical problems. Windows accommodates this; it automates as many functions as possible for the user, which gives malware a chance to sneak in. Chad Perrin of TechRepublic uses the example of executable malware disguised as a Word document. When the user opens this file, instead of running Word, Windows follows the execution cues in the file. Another example he provides is of malware that runs when a user inserts removable media; such malware takes advantage of Windows’ autorun feature.

Open-Source and Transparency

Linux is open-source, which means that anyone can view and modify the source code that runs the operating system; it is part of the reason why there are so many different versions (called distributions) of the Linux operating system. If a vulnerability is present in a program or distribution, developers tend to find it faster and find solutions to close that vulnerability. While open-source programs exist for Windows, the operating system as a whole is closed.

Security Through Variety

While it is not exactly a security feature, the variety available to Linux users in both operating system and applications makes it much harder for malware to target a majority of users. Windows users make up about 90 percent of computer users and only vary by five versions, with more than 47 percent of users on Windows 7 in January 2014. Linux only has about 1.5 percent of Internet users overall, and these users vary between several different distributions. While Ubuntu is by far the most popular version of Linux, versions like Fedora and openSUSE use a different set of tools and applications.

Источник

Why Linux is better than Windows or macOS for security

Decisions made years ago about which operating system to roll out can affect corporate security today. Of the big three in widespread use, one can credibly be called the most secure.

Enterprises invest a lot of time, effort and money in keeping their systems secure. The most security-conscious might have a security operations center. They of course use firewalls and antivirus tools. They probably spend a lot of time monitoring their networks, looking for telltale anomalies that could indicate a breach. What with IDS, SIEM and NGFWs, they deploy a veritable alphabet of defenses.

But how many have given much thought to one of the cornerstones of their digital operations: the operating systems deployed on the workforce’s PCs? Was security even a factor when the desktop OS was selected?

This raises a question that every IT person should be able to answer: Which operating system is the most secure for general deployment?

We asked some experts what they think of the security of these three choices: Windows, the ever-more-complex platform that’s easily the most popular desktop system; macOS X, the FreeBSD Unix-based operating system that powers Apple Macintosh systems; and Linux, by which we mean all the various Linux distributions and related Unix-based systems.

How we got here

One reason enterprises might not have evaluated the security of the OS they deployed to the workforce is that they made the choice years ago. Go back far enough and all operating systems were reasonably safe, because the business of hacking into them and stealing data or installing malware was in its infancy. And once an OS choice is made, it’s hard to consider a change. Few IT organizations would want the headache of moving a globally dispersed workforce to an entirely new OS. Heck, they get enough pushback when they move users to a new version of their OS of choice.

Still, would it be wise to reconsider? Are the three leading desktop OSes different enough in their approach to security to make a change worthwhile?

Certainly the threats confronting enterprise systems have changed in the last few years. Attacks have become far more sophisticated. The lone teen hacker that once dominated the public imagination has been supplanted by well-organized networks of criminals and shadowy, government-funded organizations with vast computing resources.

Like many of you, I have firsthand experience of the threats that are out there: I have been infected by malware and viruses on numerous Windows computers, and I even had macro viruses that infected files on my Mac. More recently, a widespread automated hack circumvented the security on my website and infected it with malware. The effects of such malware were always initially subtle, something you wouldn’t even notice, until the malware ended up so deeply embedded in the system that performance started to suffer noticeably. One striking thing about the infestations was that I was never specifically targeted by the miscreants; nowadays, it’s as easy to attack 100,000 computers with a botnet as it is to attack a dozen.

Does the OS really matter?

The OS you deploy to your users does make a difference for your security stance, but it isn’t a sure safeguard. For one thing, a breach these days is more likely to come about because an attacker probed your users, not your systems. A survey of hackers who attended a recent DEFCON conference revealed that “84 percent use social engineering as part of their attack strategy.” Deploying a secure operating system is an important starting point, but without user education, strong firewalls and constant vigilance, even the most secure networks can be invaded. And of course there’s always the risk of user-downloaded software, extensions, utilities, plug-ins and other software that appears benign but becomes a path for malware to appear on the system.

And no matter which platform you choose, one of the best ways to keep your system secure is to ensure that you apply software updates promptly. Once a patch is in the wild, after all, the hackers can reverse engineer it and find a new exploit they can use in their next wave of attacks.

And don’t forget the basics. Don’t use root, and don’t grant guest access to even older servers on the network. Teach your users how to pick really good passwords and arm them with tools such as 1Password that make it easier for them to have different passwords on every account and website they use.

Because the bottom line is that every decision you make regarding your systems will affect your security, even the operating system your users do their work on.

If you’re a security manager, it is extremely likely that the questions raised by this article could be rephrased like so: Would we be more secure if we moved away from Microsoft Windows? To say that Windows dominates the enterprise market is to understate the case. NetMarketShare estimates that a staggering 88% of all computers on the internet are running a version of Windows.

If your systems fall within that 88%, you’re probably aware that Microsoft has continued to beef up security in the Windows system. Among its improvements have been rewriting and re-rewriting its operating system codebase, adding its own antivirus software system, improving firewalls and implementing a sandbox architecture, where programs can’t access the memory space of the OS or other applications.

But the popularity of Windows is a problem in itself. The security of an operating system can depend to a large degree on the size of its installed base. For malware authors, Windows provides a massive playing field. Concentrating on it gives them the most bang for their efforts.
As Troy Wilkinson, CEO of Axiom Cyber Solutions, explains, “Windows always comes in last in the security world for a number of reasons, mainly because of the adoption rate of consumers. With a large number of Windows-based personal computers on the market, hackers historically have targeted these systems the most.”

It’s certainly true that, from Melissa to WannaCry and beyond, much of the malware the world has seen has been aimed at Windows systems.

macOS X and security through obscurity

If the most popular OS is always going to be the biggest target, then can using a less popular option ensure security? That idea is a new take on the old — and entirely discredited — concept of “security through obscurity,” which held that keeping the inner workings of software proprietary and therefore secret was the best way to defend against attacks.

Wilkinson flatly states that macOS X “is more secure than Windows,” but he hastens to add that “macOS used to be considered a fully secure operating system with little chance of security flaws, but in recent years we have seen hackers crafting additional exploits against macOS.”

In other words, the attackers are branching out and not ignoring the Mac universe.

Security researcher Lee Muson of Comparitech says that “macOS is likely to be the pick of the bunch” when it comes to choosing a more secure OS, but he cautions that it is not impenetrable, as once thought. Its advantage is that “it still benefits from a touch of security through obscurity versus the still much larger target presented by Microsoft’s offering.”

Joe Moore of Wolf Solutions gives Apple a bit more credit, saying that “off the shelf, macOS X has a great track record when it comes to security, in part because it isn’t as widely targeted as Windows and in part because Apple does a pretty good job of staying on top of security issues.”

And the winner is …

You probably knew this from the beginning: The clear consensus among experts is that Linux is the most secure operating system. But while it’s the OS of choice for servers, enterprises deploying it on the desktop are few and far between.

And if you did decide that Linux was the way to go, you would still have to decide which distribution of the Linux system to choose, and things get a bit more complicated there. Users are going to want a UI that seems familiar, and you are going to want the most secure OS.

As Moore explains, “Linux has the potential to be the most secure, but requires the user be something of a power user.” So, not for everyone.

Linux distros that target security as a primary feature include Parrot Linux, a Debian-based distro that Moore says provides numerous security-related tools right out of the box.

Of course, an important differentiator is that Linux is open source. The fact that coders can read and comment upon each other’s work might seem like a security nightmare, but it actually turns out to be an important reason why Linux is so secure, says Igor Bidenko, CISO of Simplex Solutions. “Linux is the most secure OS, as its source is open. Anyone can review it and make sure there are no bugs or back doors.”

Wilkinson elaborates that “Linux and Unix-based operating systems have less exploitable security flaws known to the information security world. Linux code is reviewed by the tech community, which lends itself to security: By having that much oversight, there are fewer vulnerabilities, bugs and threats.”

That’s a subtle and perhaps counterintuitive explanation, but by having dozens — or sometimes hundreds — of people read through every line of code in the operating system, the code is actually more robust and the chance of flaws slipping into the wild is diminished. That had a lot to do with why PC World came right out and said Linux is more secure. As Katherine Noyes explains, “Microsoft may tout its large team of paid developers, but it’s unlikely that team can compare with a global base of Linux user-developers around the globe. Security can only benefit through all those extra eyeballs.”

Another factor cited by PC World is Linux’s better user privileges model: Windows users “are generally given administrator access by default, which means they pretty much have access to everything on the system,” according to Noyes’ article. Linux, in contrast, greatly restricts “root.”

Noyes also noted that the diversity possible within Linux environments is a better hedge against attacks than the typical Windows monoculture: There are simply a lot of different distributions of Linux available. And some of them are differentiated in ways that specifically address security concerns. Security Researcher Lee Muson of Comparitech offers this suggestion for a Linux distro: “The Qubes OS is as good a starting point with Linux as you can find right now, with an endorsement from Edward Snowden massively overshadowing its own extremely humble claims.” Other security experts point to specialized secure Linux distributions such as Tails Linux, designed to run securely and anonymously directly from a USB flash drive or similar external device.

Building security momentum

Inertia is a powerful force. Although there is clear consensus that Linux is the safest choice for the desktop, there has been no stampede to dump Windows and Mac machines in favor of it. Nonetheless, a small but significant increase in Linux adoption would probably result in safer computing for everyone, because in market share loss is one sure way to get Microsoft’s and Apple’s attention. In other words, if enough users switch to Linux on the desktop, Windows and Mac PCs are very likely to become more secure platforms.

Источник

Читайте также:  Темы для mac os mojave
Оцените статью