Linux Kernel Analysis
Much has been written in praise of the Linux (Crandall, Wu, Chong, 359),
(Parnas, 112), (Baliga, Iftode, Chen, 323), and its use of preemptive multitasking memory architectures to manage process control, file management, device management, information maintenance and communications subsystems securely and effectively. The Linux modular design, lack of reliance on Remote Procedure Calls (RPC), and use of UNIX-based system administration all are often cited as factors in how it is significantly more secure than Microsoft Windows for example. Linux relies on a dedicated memory partition architecture more comparable to Microsoft Windows than UNIX and also has a specific API calls for each of the subsystems as well. The combination of modularity and preemptive multitasking through dedicated memory structures is also an architectural argument that Linux supporters site when defending the inherent security of this operating system. In fact the KDE and GNOME components of the operating system are monolithic, not modular in design and therefore pose a security risk from the standpoint of being accessible through the kernel. Figure 3, Linux Kernel Structure, provides a graphical representation.
Figure 3: Linux Kernel Structure
Source: (Jaeger, Edwards, Zhang, 7)
What is immediately apparent from analyzing the Linux kernel is that when you take into account its wide variation in interpretation between Linux distributions from Debian, Red Hat, MandrakeSoft and SUSE it is clear that coordination and collaboration to resolve severe security risks can be challenging. In fact the highly fragmented nature of the Linux kernel and the distributed ownership of it across all those companies who are offering unique distributions make response time to severe alerts (as defined by CERT's methodology) challenging. Further exacerbating this shared ownership of security on the Linux platform is the integration of only Crypto functions, IPSec, SSL Tunnel and firewall functions. All other functions critical for operating system security are in fact supported through 3rd party partners including Directory Support, PKI integration, Cryptography at the hardware level, Kerberos support and a security management framework. As a result of the Linux kernel structure and operating system infrastructure being so balkanized the days of risk associated with any attack and the response time to resolve them is significantly longer than any Microsoft operating system included in the analysis (Massel, et.al.). This is a function of the lack of concerted, focused collaboration on the part of companies who are creating and marketing Linux distributions. Unlike the Apple operating system and its QuickTime and Java Virtual Machine (JVM) security liabilities, Linux has more complex security threats. At the operating system, kernel and the threat of days of risk growing rapidly due to a lack of shared knowledge (despite the myth of the open source community being egalitarian) Linux has significant security vulnerabilities (Massel, et.al.).
Microsoft Windows Operating System Architecture Analysis
The Microsoft Windows architecture has evolved to support pre-emptive multitasking and also the support of up to four concurrent application environments including Win!6, Win32, POSIX and UNIX emulations on the Windows XP Server architecture, which is the processor to Windows 7. As can be seen from Figure 4, Microsoft Windows Operating System Structure the Windows API Layer includes Win16 (16 bit Windows Subsystem) and Win32 (Windows 32 Bit Subsystem) support both with their own kernels (KRNL386.EXE and KERNEL32.DLL) in addition to their own GID and user components. These two subsystems in the API layer are completely separated from the Kernel Mode. Microsoft initially made this design decision from a security standpoint. There is also a Hardware Abstraction Layer (HAL) within the architecture which supports cryptography customization to MIL-STD specifications.
Figure 4: Microsoft Windows Operating System Structure
Source: (Shone, et.al.)
The Windows Operating Structure integrated directory support, PKI, cryptography functions at the kernel and hardware levels through the hardware Abstraction Layer, while also having legacy support for Kerberos authentication and security technologies. IPSec, SSL and remote access have over time been integrated into a common subsystem which runs in its own memory space. The System Virtual Machine also has its own memory partition and is an emulation of a full Win32 runtime environment instead of making calls directly into the kernel of the operation system. Win16 and Win32-based applications therefore are not integrated to the kernel; therefore applications cannot be used to launch security attacks. Vulnerabilities within the Microsoft architecture emanate from device driver layer (Hartley, 4) and the lack of consistency on firewall definitions and methodologies over the lifecycle of the operating system (Mogull, Pepper, 1). Microsoft has also been negligent in defining common platform integration for third party systems, databases and architectures as well (Parnas, 112). These have all combined to create security liabilities for the operating system over time. In previous generations of the Microsoft architecture,...
Theories on Career Counseling Selected theories Trait and Factor Theory Parsons, the theorist who developed the Trait and Factor theory, suggested that vocational support ought to be founded on three elements. Firstly, the individual, his/her personality, interests, abilities, resources, values, and ambitions must be clearly understood. According to Parsons, clinical interviews help glean this information. Secondly, knowledge regarding the sphere of work, including knowledge of each occupation's pros and cons, opportunities, requirements, and
nursing profession is undergoing fundamental change as it relates to both internal and external regulation. Externally, new legislation such as the Affordable care act has created nearly 30 million newly insured Americas. This new demand for services, although lowering overall health care costs, presents challenges as it relates to the nursing profession. Nurses will now need expertise beyond prior requirements in order to serve this newly insured population. As
The poor is stereotypically painted as haggard and lean and the wealthy CEO (and so forth) as fat and obese, for his very indolence and lack of sluggishness makes him so. Personal counter argument To arrive at conclusions on any major issue, credible research must be conducted based on scientific, authoritative, empirical evidence. Such, too, must be done in this case and so, inquiring into reasons for the dramatic increase in
" The Ecumenical Review, 54. Kneen looks at agricultural genetic engineering and takes the view that because agricultural genetic engineering may help solve food shortage problems as well as enhance the environment, such activities should be looked at positively. Kneen puts good arguments together to make his points, but also writes from a biased viewpoint, so his article should be used in conjunction with other writers who are not quite so
person within the Christian worldview. Specifically it will discuss technology, the environment, and the media as it relates to my personal Christian worldview. As noted in this course, understanding a worldview can help a person understand other people and all their roles in today's society. Today's culture is broad, and influenced by a variety of sources, from scientific to religious, and they combine to create a contemporary Christian worldview
Such an example cannot be refuted without statistical research to make an argument against Urmetzer, and thus his arguments refuting the impact of globalization on eliminating the nation-state's sovereignty are strengthened. This sets up Urmetzer's primary point, and the thesis of his argument- it is a myth that because of globalization "national borders have become so porous that governments are no longer able to properly manage their own affairs" (Urmetzer 2005: 123). In the case of
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now