A Continuing Look at Windows v. Linux SecuritySep 26, 2005, 23:30 (16 Talkback[s])
(Other stories by Brandioch Conner)
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
By Brandoch Conner
First--here's my current working definition of "security": it's the process of evaluating threats and reducing their effectiveness.
You will never be 100% "secure" because the upper limit is bound by human stupidity. The best you can do is to reduce the threats to just below that level. Sure, you can protect your system against viruses/worms/trojans and so forth, but you will still lose files/data/time/money because people will accidentally delete them. If the amount of data/time/money/etc lost as a result of viruses/worms/trojans is LESS than the amount of data/time/money/etc lost due to human error, then you're doing a good job.
Ideally, you'll lose no data and spend no time/money in recovery, but you will spend time/money on the security process for those systems. The better designed the base system is, the less of the second part you'll be spending.
My last column covered basic operating system security (viruses/worms) so this one will be a lot shorter. This time it's about trojans.
Most of the "email viruses" you hear about for Windows are really trojans. They don't "infect" other files (except to completely over write the file with their own code) and they require a person to launch them and they run with the permissions of that person.
The reason you see so many of them right now is because of three main reasons:
So, the simple way for Linux to remain as free of trojans as it currently is would be to... not build an email app that allows users to launch apps from within it. This should not be too terribly difficult to accomplish as apps under Linux need the "execute bit" set to be able to run. Remember, not doing something because it is a dumb idea and easily exploited is good security practice.
In fact, why not set the home directories to be non-executable? That way you would have to accidentally ...
If you're saving unknown code to a system directory and then running it, you've hit the limits of "security" and you're into the realm of "human stupidity."
And finally, here's my ranking of "vulnerabilities" because lately I've been seeing too much crap about "critical" or "severe" vulnerabilities in various systems/apps.
Now, look at the number of services listening on open ports in a default Windows installation. Those are the ones at risk at levels 1 and 2. Some Linux distributions have default configurations with apps running and listening on open ports, so this isn't just Microsoft. That is one of the reasons I like Debian and Ubuntu. Ubuntu has nothing open and I can build Debian servers from a minimal installation without any additional services running.
0 Talkback[s] (click to add your comment)