StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Mac VS Windows Security - Essay Example

Cite this document
Summary
SMB is a Network sharing protocol. SMB operates in a client and server manner. Remote clients can check availability on SMB service on port 139 and 445 by doing port scan and this…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Mac VS Windows Security
Read Text Preview

Extract of sample "Mac VS Windows Security"

Hussain Alfaraj - 100505107 Perhaps the weakness in windows and Mac is the SMB, which stands for Service Message Block. SMB is a Network sharing protocol. SMB operates in a client and server manner. Remote clients can check availability on SMB service on port 139 and 445 by doing port scan and this vulnerability that is referred to as MS08-68. (Microsoft.com) “A SMB Relay attack is a type of man-in-the-middle attack where the attacker asks the victim to authenticate to a machine controlled by the attacker, then relays the credentials to the target.

The attacker forwards the authentication information both ways, giving him access. Afterward, the attacker tricks the victim into connecting with him before the attacker establishes connection to the target, receives the 8-byte challenge. Subsequently, the attacker sends the 8-byte challenge to victim, who then responds to the attacker with the password hash. Attacker responds back to the targets challenge with the victims hash and finally Target grants access to attacker” (SkullSecurity, 2008).

The Protective measure of this problem is to remove NetBIOS from any network card to reduce the possibility of abusing SMB. In addition, the following steps can help mitigate this weakness: “Enable (and require) NTLMv2 authentication -- this will prevent pre-computed attacks, because the client provides part of the randomness. Enable (and require) message signing for both clients and servers -- this will prevent relay attacks. Install ms08-068 -- this will prevent a specific subset of relay attacks, where its relayed back to itself.

” (SkullSecurity, 2008) RPS attack (Remote procedure call) is used over SMB to offer file and printing sharing. Attacker can compromise the system by sending RPC request to gain access. This usually happens through port 139, which is known as the NetBIOS. “NetBIOS over the Internet is an enormous security risk. The NetBIOS protocol gives people the ability to obtain all kind of information from your systems like your domain, workgroup and system names, as well as account information. To prevent this from happening make sure that on your border gateways you filter out all in- and outgoing traffic for ports 137, 138 and 139.

” (Dennis Leeuw dleeuw, 2011) That being said, Mac, UNIX/Linux machines also use these ports, due to a Windows-file-sharing-compatibility package called Samba. Another vulnerability we are introducing is the Abusing remote Desktop Protocol (RDP). Remote Desktop Protocol (RDP) is a protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. This enhancement can be a threat when it allows an authorized remote user to connect to the operating system.

Connection is usually secured by a username and pass. Therefore, it all depends on the strength of the password. Since this works on port 3389, this is easily found by port scanning. This is threat is more prevalent in Windows when compared to Mac.Unfortunately, even the last version of windows is easily compromised by abusing this enhancement: “One of the new security features in the latest Windows release (Windows 8.1) is the Restricted Admin mode for Remote Desktop Connection.This measure is meant to enhance Windows credential protection against attacks such as Pass-the-Hash and Pass-the-Ticket.

However, it appears that cure might be worse than the disease as the new “Restricted Admin mode” opens a new attack surface for the very same attacks it was meant to protect against. Ultimately, this feature enables attackers to perform Pass-the-Hash and Pass-the-Ticket attacks by connecting to targeted machines via a Remote Desktop Protocol (RDP) connection” (Tal Beery, 2014).The third type of vulnerabilities is a Rootkit, which target both Mac OS and windows. “A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence.

The term Rootkit is a connection of the two words "root" and "kit". Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network. Root refers to the Admin account on Unix and Linux systems, and kit refers to the software components that implement the tool. Today rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes” (veracode). Attacker can exploit the network flow to inject the OS with a rootkit and this process results in a full control of the system.

The last vulnerabilities we are introducing are memory attacks. Hackers can gain access to a system by taking over Windows through its PCMCIA Card. This means that the CPU and OS were bypassed unable to stop malicious DMA request: “The attack, which makes use of the Direct Memory Access (DMA) feature found in modern computer systems, could be highly difficult to guard against, since it bypasses the operating system and CPU entirely, the researchers said in a paper discussing their research.

However, there are also evident limitations, since the attack requires physical access to the system” (Kingsley-Hughes, 2015)Both Windows and Mac are vulnerable to exploits and breaches, such as SMB, RDP, and Rootkit vulnerabilities. Breaches are often enhancements, but can be compromised by those who have the technological knowledge to break the system. While many people argue that Mac is more secure than windows, some researchers have proved this as a false assumption. “According to a report by security firm GFI, Apples Mac OS X is the most vulnerable operating system, with the iOS platform coming in second.

As you have seen, in most cases the user is responsible for the system. Therefore, it is extremely important to be aware of these security issues, and take proactive steps to secure the operating system (Kingsley-Hughes, 2015).ReferencesA. Kingsley-Hughes. (2015). Mac OS X is the most vulnerable OS, claims security firm; Debate ensues [Online]. Available http://www.zdnet.com/article/mac-os-x-is-the-most-vulnerable-os-claims-security-firm D. L. dleeuw (2010). SAMBA Configuration [Online]. Available: http://pig.made-it.com/samba-setup.

html Microsoft (2003). What Is RPC? [Online]. Available: https://technet.microsoft.com/en-us/library/cc787851(v=ws.10).aspx SkullSecurity (2008). ms08-068 — Preventing SMBRelay Attacks[Online] . Available: https://blog.skullsecurity.org/2008/ms08-068-preventing-smbrelay-attacks Tal Beery (2014). Remote Desktop’s Restricted Admin: Is the Cure Worse Than the Disease? [Online]. Available: http://www.aorato.com/blog/remote-desktops-restricted-admin-cure-worse-disease/ Veracode (2015). Rootkit: What is a Rootkit, Scanners, Detection and Removal Software [Online].

Available: http://www.veracode.com/security/rootkit

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mac VS Windows Security Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Mac VS Windows Security Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1688238-mac-vs-windows-security
(Mac VS Windows Security Essay Example | Topics and Well Written Essays - 500 Words)
Mac VS Windows Security Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1688238-mac-vs-windows-security.
“Mac VS Windows Security Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1688238-mac-vs-windows-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mac VS Windows Security

Virtual Private Network Tools

hellip; According to the research findings, it can, therefore, be said that reliability, privacy, and security of data are some of the key component considered essential with critical data and information being exchanged within an organization's network.... In addition to the provision of an alternative to the use of the proxy server for remote access to campus resources, VPN also ensures secure methods to authenticate to the campus wireless network hence data security through the use of encryption technologies such as PPTP, L2TP, IPSec, and SOCKS....
18 Pages (4500 words) Term Paper

Windows versus mac

[W3] The comparisons of Windows Vista and Mac OS X from User-Interface, security, speech-recognition, web-browsing, multimedia authoring, Widgets/Gadgets, kernel and performance perspective is given in following paragraphs.... security: This is the tough task as Vista is only one month old (commercially).... windows Vista (earlier known as codename ‘Longhorn'), a proprietary, graphical operating system used on personal computers (home and business), is the latest release of Microsoft windows....
4 Pages (1000 words) Essay

Installation and Migration Computer's OS

This paper tells that Soap-n-Suds, the international manufacturer of laundry soaps, currently use windows operating system on their company's desktop computers.... As per the request of the Vice President (Information Technology), I have compared the three major operating systems and these are my findings: windows, Linux, Mac OS windows is a software operating system produced by Microsoft.... The recent version of windows is windows 7, and the latest server version is windows Server 2008 R2....
4 Pages (1000 words) Essay

Macs and Windows: Compatibility Issues

Stability, security and Reliability ConcernsA.... tability, security and Reliability ConcernsIn 2002, Apple, introduced the OS X, an operating system (OS) based on UNIX.... When we compare an Apple Mac to an MS windows PC, two traditional feasible choices for personal and business computing, though, the subjective should be thrown out of the window and the facts wisely considered.... ThesisWhile it is true that windows has been ‘virally' popular, the time has come for certain misconceptions about the Mac to be cleared up and how it will be a very good choice....
2 Pages (500 words) Essay

Why Apple Computer Is Better than Windows

mac vs.... The Benefits of mac vs.... The other advantage of apple computers over windows is the security of their system.... Apple computers are not vulnerable to such insecurity threats because they have superior built-in security system than windows computers.... Below are some of the aspects of apple computers that make them the preferred… The first advantage of apple computers over windows computers is the operating system flexibility (Martin, 2008)....
2 Pages (500 words) Essay

Compare Mac and Windows System

Journal of Information security, 5(3), 124–135.... develop Macintosh (MAC) and windows operating systems respectively.... While windows are developed for any personal computer, Apple develops… These systems have been put up against each other over decades, and the debate seems destined to be eternal. Cost is key among the cited difference between MAC and windows systems.... windows based computers tend to be cheaper than MAC Compare Mac and windows System Compare Mac and windows System The most widely used graphical user interface-based operating systemson desktop computers include MAC and windows....
2 Pages (500 words) Essay

Linux and Mac File Systems

The Academic community and startup companies are opting for Linux due to the availability of its source code and the fact that security patches are released more often than those of Windows.... It was created by Microsoft and supports windows operating system.... It was created by Microsoft and supports windows operating system.... In mac OS, the equivalent of the inode in Linux is referred to as indirect node file.... Though, mac OS is UNIX based, its file system does not implement inode like Linux but a similar indexing is implemented....
1 Pages (250 words) Article

Linux or Windows: Which is More Secure

The author compares Windows and Linux security and states that the final decision does go towards Linux simply because they have proven themselves to be true while Microsoft Windows still has a long way to go before security can be a proven feature of the OS.... However, from a technical as well as a business standpoint, it is an important discussion, therefore, a comparison in terms of security for Windows and Linux is to be made in this report....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us