Preview

Pos420 Final Paper

Powerful Essays
Open Document
Open Document
2424 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pos420 Final Paper
Unix, Linux, and Windows Server Critique
For Kudler Fine Foods
POS/420

Unix, Linux, and Windows Server Critique Kudler Fine Foods is an upscale specialty food store located in San Diego California, with 3 locations in La Jolla, Del Mar and Encinitas. Kathy Kudler opened Kudler Fine Foods in June 1998, and grew quickly to open the 3 locations in as little as 5 years. While the mission is to provide the finest products and to assure Kudler is the purveyor of choice for customers aspiring to purchase the finest epicurean delights, the company must have the best possible technology to meet the business needs. The objective is critiquing possible Servers that will improve the protection of data, provide a stable environment to support business, allow transaction monitoring, store sales transactions from POS terminals, backup data, and manage databases. The purpose is to weigh the pros and cons of the different servers, find the one server that will meet the needs of the business, and implement the server to the end users. The critique will include security, administration, networking, performance, and programmability.
Security
When beginning a discussion of computer security, a number of variables come into play. From patch availability to OS popularity, antivirus offerings, user/administrator knowledge and even physical user controls, many elements must be considered to create a computing environment that is secure. While Windows and Linux each have their advantages and disadvantages, neither operating system is, at its core, more or less safe than the other from attacks and data theft. All operating systems have vulnerabilities before they ever ship, and it is up to the administrator of those systems to maintain a level of security that protects the valuable data stored on those servers. Windows and Linux operating systems have a few large advantages and disadvantages that are worth analyzing when considering security. Interestingly enough, the



References: Jensen, J. (2007). UNIX vs. Windows. Retrieved from http://www.networkbits.net Gite, V. (2006). What is the role of the system administrator?. Retrieved from http://www.cyberciti.biz/faq/what-is-the-role-of-the-system-administrator/ Hart, J. M. (2010). Windows system programming. 4th edition. Upper Saddle River, NJ. Addison-Wesley. Microsoft Tackett, J. and Gunter, D. (1997). Special edition. Using Linux. 3rd edition. Indianapolis, IN. QUE Corporation. Venezia, P. (2011). The decline and fall of system administration. Retrieved from http://www.infoworld.com/d/data-center/the-decline-and-fall-system-administration-375?page=0,1 Capabilities and Functionality Windows Server vs. Linux. (2010). Retrieved 11/29/11 from http://www.networkworld.com/news/2010/060710-tech-argument-windows-server-linux.html?page=1

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS level * Patch history * Resilient computing * Stateful inspection * Whitelists-Blacklists * DB encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 2629 Words
    • 11 Pages

    |Security |Linux users are not burdened with the need for anti |Windows users are burdened with the need for |…

    • 2629 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Netw 240 course project

    • 1091 Words
    • 5 Pages

    Henderson, T., & Allen, B. (2009). Ubuntu server review. Network World US. Retrieved from http://review.techworld.com/operating-systems/317151/ubuntu-server-review/…

    • 1091 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    Analyze a mixed-version Microsoft Windows environment and identify the issues described in Microsoft Security Advisories.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    While researching the regulatory requirements needed for First World Bank Savings and Loans I found that a security policy against current server architecture is required to be implemented. The CIA (Confidentiality, Integrity, and Availability) triad is taken into account when analyzing the multiple servers in reference to Linux and Open Source managing security demands.…

    • 295 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Operating System

    • 1099 Words
    • 5 Pages

    Answer: d. It redirects the output of one command to the input of another command.…

    • 1099 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Unix File Protection

    • 716 Words
    • 3 Pages

    UNIX offers a file protection system that is straightforward and simple to use. However, many people are not aware of the value of this powerful mechanism. A secure environment is achieved not only by the operating system, but also through vigilant user and administrative practices. There are many schemes and mechanisms used in the UNIX operating system, as well as some simple tricks that are available to give the kind of file protection administrators want. For the purpose of this paper, a company with 5,000 employees, where 4,990 employees are allowed access to a specific file will be assessed.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Windows Installation

    • 930 Words
    • 4 Pages

    In this Analysis assessment I'm going to explain some advantages and disadvantages of windows server 2008 server core and virtual servers. What environments windows server core installation ideal, and I will explain if the security benefits of a core server outweigh the lack of a Graphical User Interface (GUI). I also will go through some advantages and disadvantages of implicating a virtual server in a live network. Finally I will be giving my response to this statement “The drawback of virtual servers is the loss of a physical machine that can lead to the loss of numerous virtual servers and numerous services on the network.…

    • 930 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The targeted consumers is people who have demand for basic server, especially who are interested in one application, especially either of file sharing and web servers, and who seeks the way to minimize the initial purchase costs and subsequent possession costs.…

    • 1011 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Known Operating Syst

    • 507 Words
    • 2 Pages

    In describing known operating security with in the operating systems. I will be describing how the systems are compromised how to counter the attack and what the attack does to the system. In the UNIX systems the vulnerability named shellshock which is a command line interrupter for Linux and Mac OSx, describe how it effects the Bash shell and is used to gain access to systems..…

    • 507 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. SPARC T4 Servers offer optimized and improved performance for which types of workloads? Mark for Review…

    • 4069 Words
    • 28 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Shell Scripting in Linux

    • 34034 Words
    • 137 Pages

    What follows is a copy of the "human-readable summary" of this document. The Legal Code (full license) may be…

    • 34034 Words
    • 137 Pages
    Satisfactory Essays
  • Better Essays

    Windows vs Linux

    • 1588 Words
    • 7 Pages

    This article is a comparison between two similar but yet different operating systems Microsoft Windows and Linux. One will have a clear idea about each of these systems and would not find it difficult choosing between them. An operating system is somewhat a software program that connects the users with the hardware of the computer. Without an operating system a computer is useless. There are many different operating systems in the world today. One can argue that Microsoft Windows is the top selling operating system today, while Linux is in the top ten. The purpose of this article is to discuss different features of these two systems for example, price, and ease of use, reliability, software, software cost, hardware, security and support.…

    • 1588 Words
    • 7 Pages
    Better Essays
  • Good Essays

    (Dell, n.d.) The hardware cost is the result of the requirement of three Dell PowerEdge R830 Rack Server valued at $167,247.30, a cost of $55,749.10 per server, IT staff efficient hardware and resources to manage all users and data resources. Additionally, two SC7000 valued at $13,998.00, cost of $6,999.00 per server, provides the needed data storage capabilities for the sharing of records, and a redundant backup of financial data. (Dell, n.d.) Firstly, the three Dell PowerEdge R830 are capable of handling all virtualization, databased, and software application requirements, for future system software upgrades and company growth. Secondly, Database software requirement obtain freely in the form of Java Derby Database, with portability and security features allowing to span across multiple hardware platform designations. (NetBeans, n.d.) Thirdly, the servers come preinstalled with Windows Server 2010 R2, providing the software required to integrate all users within one single domain. (Dell, n.d.) Additionally, the active directory software and virtualization software required to operate SAN (storage area network) servers in a raid configuration, the SC7000s. Fourthly, the virtualization capabilities included with the additional…

    • 1110 Words
    • 5 Pages
    Good Essays