{"id":11381,"date":"2018-02-06T04:30:03","date_gmt":"2018-02-06T12:30:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/02\/06\/news-5152\/"},"modified":"2018-02-06T04:30:03","modified_gmt":"2018-02-06T12:30:03","slug":"news-5152","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/02\/06\/news-5152\/","title":{"rendered":"Why Linux is better than Windows or macOS for security"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/02\/linux_security_vs_macos_and_windows_locks_data_thinkstock-100748607-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dave Taylor| Date: Tue, 06 Feb 2018 03:31:00 -0800<\/strong><\/p>\n<p>Enterprises invest a lot of time, effort and money in keeping their systems secure. The most security-conscious might have a security operations center. They of course use firewalls and antivirus tools. They probably spend a lot of time monitoring their networks, looking for telltale anomalies that could indicate a breach. What with IDS, SIEM and NGFWs, they deploy a veritable alphabet of defenses.<\/p>\n<p>But how many have given much thought to one of the cornerstones of their digital operations: the operating systems deployed on the workforce\u2019s PCs? Was security even a factor when the desktop OS was selected?<\/p>\n<p>This raises a question that every IT person should be able to answer: Which operating system is the most secure for general deployment?<\/p>\n<p>We asked some experts what they think of the security of these three choices: Windows, the ever-more-complex platform that\u2019s easily the most popular desktop system; macOS X, the FreeBSD Unix-based operating system that powers Apple Macintosh systems; and Linux, by which we mean all the various Linux distributions and related Unix-based systems.<\/p>\n<p>One reason enterprises might not have evaluated the security of the OS they deployed to the workforce is that they made the choice years ago. Go back far enough and all operating systems were reasonably safe, because the business of hacking into them and stealing data or installing malware was in its infancy. And once an OS choice is made, it\u2019s hard to consider a change. Few IT organizations would want the headache of moving a globally dispersed workforce to an entirely new OS. Heck, they get enough pushback when they move users to a new version of their OS of choice.<\/p>\n<p>Still, would it be wise to reconsider? Are the three leading desktop OSes different enough in their approach to security to make a change worthwhile?<\/p>\n<p>Certainly the threats confronting enterprise systems have changed in the last few years. Attacks have become far more sophisticated. The lone teen hacker that once dominated the public imagination has been supplanted by well-organized networks of criminals and shadowy, government-funded organizations with vast computing resources.<\/p>\n<p>Like many of you, I have firsthand experience of the threats that are out there: I have been infected by malware and viruses on numerous Windows computers, and I even had macro viruses that infected files on my Mac. More recently, a widespread automated hack circumvented the security on my website and infected it with malware. The effects of such malware were always initially subtle, something you wouldn\u2019t even notice, until the malware ended up so deeply embedded in the system that performance started to suffer noticeably. One striking thing about the infestations was that I was never specifically targeted by the miscreants; nowadays, it\u2019s as easy to attack 100,000 computers with a botnet as it is to attack a dozen.<\/p>\n<p>The OS you deploy to your users does make a difference for your security stance, but it isn\u2019t a sure safeguard. For one thing, a breach these days is more likely to come about because an attacker probed your users, not your systems. A <a href=\"https:\/\/www.esecurityplanet.com\/hackers\/fully-84-percent-of-hackers-leverage-social-engineering-in-attacks.html\" rel=\"noopener nofollow\" target=\"_blank\">survey<\/a> of hackers who attended a recent DEFCON conference revealed that \u201c84 percent use social engineering as part of their attack strategy.\u201d Deploying a secure operating system is an important starting point, but without user education, strong firewalls and constant vigilance, even the most secure networks can be invaded. And of course there\u2019s always the risk of user-downloaded software, extensions, utilities, plug-ins and other software that appears benign but becomes a path for malware to appear on the system.<\/p>\n<p>And no matter which platform you choose, one of the best ways to keep your system secure is to ensure that you apply software updates promptly. Once a patch is in the wild, after all, the hackers can reverse engineer it and find a new exploit they can use in their next wave of attacks.<\/p>\n<p>And don\u2019t forget the basics. Don\u2019t use root, and don\u2019t grant guest access to even older servers on the network. Teach your users how to pick really good passwords and arm them with tools such as <a href=\"http:\/\/www.1password.com\" rel=\"noopener nofollow\" target=\"_blank\">1Password<\/a> that make it easier for them to have different passwords on every account and website they use.<\/p>\n<p>Because the bottom line is that every decision you make regarding your systems will affect your security, even the operating system your users do their work on.<\/p>\n<p>If you\u2019re a security manager, it is extremely likely that the questions raised by this article could be rephrased like so: Would we be more secure if we moved away from Microsoft Windows? To say that Windows dominates the enterprise market is to understate the case. <a href=\"https:\/\/www.netmarketshare.com\/operating-system-market-share.aspx?options=%7B%22filter%22%3A%7B%22%24and%22%3A%5B%7B%22deviceType%22%3A%7B%22%24in%22%3A%5B%22Desktop%2Flaptop%22%5D%7D%7D%5D%7D%2C%22dateLabel%22%3A%22Trend%22%2C%22attributes%22%3A%22share%22%2C%22group%22%3A%22platform%22%2C%22sort%22%3A%7B%22share%22%3A-1%7D%2C%22id%22%3A%22platformsDesktop%22%2C%22dateInterval%22%3A%22Monthly%22%2C%22dateStart%22%3A%222017-02%22%2C%22dateEnd%22%3A%222018-01%22%2C%22segments%22%3A%22-1000%22%7D\" rel=\"noopener nofollow\" target=\"_blank\">NetMarketShare<\/a> estimates that a staggering 88% of all computers on the internet are running a version of Windows.<\/p>\n<p>If your systems fall within that 88%, you\u2019re probably aware that Microsoft has continued to beef up security in the Windows system. Among its improvements have been rewriting and re-rewriting its operating system codebase, adding its own antivirus software system, improving firewalls and implementing a sandbox architecture, where programs can\u2019t access the memory space of the OS or other applications.<\/p>\n<p>But the popularity of Windows is a problem in itself. The security of an operating system can depend to a large degree on the size of its installed base. For malware authors, Windows provides a massive playing field. Concentrating on it gives them the most bang for their efforts. <br \/> As Troy Wilkinson, CEO of Axiom Cyber Solutions, explains, \u201cWindows always comes in last in the security world for a number of reasons, mainly because of the adoption rate of consumers. With a large number of Windows-based personal computers on the market, hackers historically have targeted these systems the most.\u201d<\/p>\n<p>It\u2019s certainly true that, from Melissa to WannaCry and beyond, much of the malware the world has seen has been aimed at Windows systems.<\/p>\n<p>If the most popular OS is always going to be the biggest target, then can using a less popular option ensure security? That idea is a new take on the old \u2014 and entirely discredited \u2014 concept of \u201csecurity through obscurity,\u201d which held that keeping the inner workings of software proprietary and therefore secret was the best way to defend against attacks.<\/p>\n<p>Wilkinson flatly states that macOS X \u201cis more secure than Windows,\u201d but he hastens to add that \u201cmacOS used to be considered a fully secure operating system with little chance of security flaws, but in recent years we have seen hackers crafting additional exploits against macOS.\u201d<\/p>\n<p>In other words, the attackers are branching out and not ignoring the Mac universe.<\/p>\n<p>Security researcher Lee Muson of Comparitech says that \u201cmacOS is likely to be the pick of the bunch\u201d when it comes to choosing a more secure OS, but he cautions that it is not impenetrable, as once thought. Its advantage is that \u201cit still benefits from a touch of security through obscurity versus the still much larger target presented by Microsoft\u2019s offering.\u201d<\/p>\n<p>Joe Moore of Wolf Solutions gives Apple a bit more credit, saying that \u201coff the shelf, macOS X has a great track record when it comes to security, in part because it isn\u2019t as widely targeted as Windows and in part because Apple does a pretty good job of staying on top of security issues.\u201d<\/p>\n<p>You probably knew this from the beginning: The clear consensus among experts is that Linux is the most secure operating system. But while it\u2019s the OS of choice for servers, enterprises deploying it on the desktop are few and far between.<\/p>\n<p>And if you did decide that Linux was the way to go, you would still have to decide which distribution of the Linux system to choose, and things get a bit more complicated there. Users are going to want a UI that seems familiar, and you are going to want the most secure OS.<\/p>\n<p>As Moore explains, \u201cLinux has the potential to be the most secure, but requires the user be something of a power user.\u201d So, not for everyone.<\/p>\n<p>Linux distros that target security as a primary feature include <a href=\"https:\/\/www.parrotsec.org\/\" rel=\"noopener nofollow\" target=\"_blank\">Parrot Linux<\/a>, a Debian-based distro that Moore says provides numerous security-related tools right out of the box.<\/p>\n<p>Of course, an important differentiator is that Linux is open source. The fact that coders can read and comment upon each other\u2019s work might seem like a security nightmare, but it actually turns out to be an important reason why Linux is so secure, says Igor Bidenko, CISO of Simplex Solutions. \u201cLinux is the most secure OS, as its source is open. Anyone can review it and make sure there are no bugs or back doors.\u201d<\/p>\n<p>Wilkinson elaborates that \u201cLinux and Unix-based operating systems have less exploitable security flaws known to the information security world. Linux code is reviewed by the tech community, which lends itself to security: By having that much oversight, there are fewer vulnerabilities, bugs and threats.\u201d<\/p>\n<p>That\u2019s a subtle and perhaps counterintuitive explanation, but by having dozens \u2014 or sometimes hundreds \u2014 of people read through every line of code in the operating system, the code is actually more robust and the chance of flaws slipping into the wild is diminished. That had a lot to do with why <em>PC World<\/em> came right out and said Linux is more secure. As Katherine Noyes <a href=\"https:\/\/www.pcworld.com\/article\/202452\/why_linux_is_more_secure_than_windows.html\">explains<\/a>, \u201cMicrosoft may tout its large team of paid developers, but it\u2019s unlikely that team can compare with a global base of Linux user-developers around the globe. Security can only benefit through all those extra eyeballs.\u201d<\/p>\n<p>Another factor cited by <em>PC World <\/em>is Linux\u2019s better user privileges model: Windows users \u201care generally given administrator access by default, which means they pretty much have access to everything on the system,\u201d according to Noyes\u2019 article. Linux, in contrast, greatly restricts \u201croot.\u201d<\/p>\n<p>Noyes also noted that the diversity possible within Linux environments is a better hedge against attacks than the typical Windows monoculture: There are simply a lot of different distributions of Linux available. And some of them are differentiated in ways that specifically address security concerns. Security Researcher Lee Muson of Comparitech offers this suggestion for a Linux distro: \u201cThe<a href=\"https:\/\/www.qubes-os.org\/\" rel=\"noopener nofollow\" target=\"_blank\"> Qubes OS<\/a> is as good a starting point with Linux as you can find right now, with an <a href=\"https:\/\/twitter.com\/snowden\/status\/781493632293605376?lang=en\" rel=\"noopener nofollow\" target=\"_blank\">endorsement from Edward Snowden<\/a> massively overshadowing its own extremely humble claims.\u201d Other security experts point to specialized secure Linux distributions such as <a href=\"https:\/\/tails.boum.org\/about\/index.en.html\" rel=\"noopener nofollow\" target=\"_blank\">Tails Linux<\/a>, designed to run securely and anonymously directly from a USB flash drive or similar external device.<\/p>\n<p>Inertia is a powerful force. Although there is clear consensus that Linux is the safest choice for the desktop, there has been no stampede to dump Windows and Mac machines in favor of it. Nonetheless, a small but significant increase in Linux adoption would probably result in safer computing for everyone, because in market share loss is one sure way to get Microsoft\u2019s and Apple\u2019s attention. In other words, if enough users switch to Linux on the desktop, Windows and Mac PCs are very likely to become more secure platforms.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3252823\/linux\/why-linux-is-better-than-windows-or-macos-for-security.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/02\/linux_security_vs_macos_and_windows_locks_data_thinkstock-100748607-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dave Taylor| Date: Tue, 06 Feb 2018 03:31:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Enterprises invest a lot of time, effort and money in keeping their systems secure. The most security-conscious might have a security operations center. They of course use firewalls and antivirus tools. They probably spend a lot of time monitoring their networks, looking for telltale anomalies that could indicate a breach. What with IDS, SIEM and NGFWs, they deploy a veritable alphabet of defenses.<\/p>\n<p>But how many have given much thought to one of the cornerstones of their digital operations: the operating systems deployed on the workforce\u2019s PCs? Was security even a factor when the desktop OS was selected?<\/p>\n<p>This raises a question that every IT person should be able to answer: Which operating system is the most secure for general deployment?<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3252823\/linux\/why-linux-is-better-than-windows-or-macos-for-security.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10496,11271,714],"class_list":["post-11381","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-linux","tag-operating-systems","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11381"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11381\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11381"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}