Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

A Report on the Security Algorithms and Protection Matrix Used by the Microsoft Windows Operating System and Apple Mac Operating System

Introduction

Computer devices are equipped with an operating system (OS) to work efficiently and effectively. This software program manages the hardware and software resources of the computer (Nisan & Schocken, 2021). Microsoft Windows (developed by the Microsoft Corporation) and Apple Mac OS (acquired by Apple Inc.) are the most common operating systems installed on computers and laptops (Edge & Trouton, 2023). With the evolution of technology, issues about the Security and protection of computer resources have changed radically; however, developers of Operating Systems have developed various techniques to ensure that Security and safety is provided to the computer system and the user (Nisan & Schocken, 2021). This report compares the algorithms and matrices employed by Microsoft Windows and Apple Mac OS. Moreover, detailed information on how these algorithms and matrices ensure the Security and protection of the computer system and users will be discussed.

Part 1: Algorithms Used by Microsoft Windows OS and Apple Mac OS to Provide Security to the Computer System and User

Algorithms used by Microsoft Windows OS to Provide Security to the Computer System.

The Microsoft Windows OS has been developed to ensure the Security of the computer system and the user. As technology evolves, new methods of security breaches and attacks are designed; however, Microsoft Windows revises the input of their OS to ensure that all areas of improvement are evaluated and worked on (Srinivasan & Vengatesan, 2023). The following are the primary algorithms integrated into the Microsoft Windows OS to provide a robust security system for Windows users.

Secure Boot – When the computer is in the process of starting up, it is possible for malicious software to load during the booting process (Srinivasan & Vengatesan, 2023). The MS Windows OS employs a digital signature algorithm referred to as secure boot to ensure the integrity of the booting process and prevent the loading of malicious software.

Windows Firewall – Connecting a device to a network connection can establish the flow of information from the internet. The Windows Firewall is an MS Windows algorithm that prevents unauthorized access over a network connection (Malallah et al., 2021). Windows Firewall analyses data packages and then determines which ones should be allowed and which should be restricted based on prior commands to the system.

Windows Hello- This algorithm authenticates the logging in of a user using their fingerprints, face recognition or password (Srinivasan & Vengatesan, 2023). This algorithm ensures that there is no unauthorized access to the system resources.

Windows Defender- Virus definitions and operations keep changing with time, hence, windows defender ensures that the MS Windows OS receives real-time protection against malware, viruses and spyware. Malallah et al. (2021) explain that the algorithm integrates behaviour-based and signature-based detection techniques to identify malicious software.

BitLocker- Encrypting information on the computer system is crucial to ensure that the privacy and confidentiality of information are safeguarded. The BitLocker is an algorithm that encrypts entire drives or partitions. When logging into a device supported by the MS Word OS, BitLocker seeks to ensure that access to the system is allowed after the correct password has been used (Srinivasan & Vengatesan, 2023). This algorithm uses the Advanced Encryption Standard (AES) model with 128-bit or 256-bit key length to encrypt data.

User Account Control (UAC) – UnauthorizedUnauthorized changes to a system are key security issues that might impact a system’s operation. Therefore, the User Account Control Algorithm seeks assurance from the user regarding any changes being attempted on the system to ensure that the changes are intentional (Malallah et al., 2021).

Algorithms used by Apple Mac OS to Provide Security to the Computer System.

Secure Boot-Just like the MS Windows OS, the Mac OS has a secure boot algorithm that authenticates the logging-in process to ensure that no malicious software is loading to invade the system.

Safari Sandbox – When using a browser using an Apple device, it is possible to run several tabs to carry out a specific task effectively (Sandoval & Thulasiraman, 2019). There is a potential risk of transferring malicious software from one account to another; hence, an algorithm referred to as the Safari Sandbox ensures that each tab is isolated and functions independently from the rest to prevent the execution of malicious software from one account to another.

Touch ID – Just like the term describes the algorithm, Touch ID authenticates logging in to the Mac OS through the use of biometrics. This algorithm ensures that there is no unauthorized access to the system.

Keychain – The need to secure information on an Apple device calls for using passwords and pins. This sensitive information also needs to be confirmed; hence, the Keychain algorithm, which integrates the DES encryption algorithm, manages passwords, and sensitive and confidential information, among others (Sandoval & Thulasiraman, 2019).

Firewall – The firewall feature is also integrated into the Mac OS to ensure that only the right information derived from network connections is allowed into the system.

FileVault – With the need to secure data and ensure that authorized parties only access it, the FileVault algorithm encrypts an entire hard drive by using the XTS-AES 128-bit or 256-bit encryption algorithm to encrypt data.

Gatekeeper – The gatekeeper algorithm determines the integrity of an application being downloaded into the Mac OS. Therefore, this algorithm can restrict any malicious software from reaching the OS.

Microsoft Windows OS or Apple Mac OS? Which one is better?

MS Windows and Apple Mac OS have robust algorithms that ensure the computer system’s Security. However, certain factors contribute to a whole security system of one operating system compared to the other. For example, Mac OS employs the Gatekeeper algorithm to ensure that malicious software and applications are not downloaded into the system (Sandoval & Thulasiraman, 2019). While the BitLocker of MS Word OS encrypts the entire or part of the hard drive disc, the Mac OS File Vault ensures that the whole hard disc is encrypted through built-in-full disk encryption. Both OS have authentication features, but the Mac OS keychain algorithm integrates an iCloud Keychain feature, which uses 256-bit AES encryption and Elliptic curve cryptography to protect confidential data (Gray, 2022). Whereas both ora employ the Firewall algorithm to ensure only viable data is derived over network connections, the Mac OS firewall algorithm has a feature called Application Firewall which is lacking in the MS Word OS. This feature enhances the operation of the Firewall feature by critically scrutinizing any information from unknown sources.

With these comparisons stated above, it is clear that the Apple Mac OS is more secure than the Microsoft Windows OS. Moreover, the market share of MS Windows OS is more significant than that of the Apple Mac OS, with the former having a 76% global market share(Gray, 2022). Therefore, the fact that it has a significant market share means that it is commonly used; hence, a large population of data can be acquired from the system. Therefore, this system may be vulnerable to attacks compared to the Mac OS.

Improving the Security of an Operating System

As mentioned earlier, the evolution of technology introduces some drawbacks, such as improved means of software system attaches and breaches. Therefore, one major way of making an OS more secure is by performing regular auditing to determine any gaps in the system’s effective operation (Gray, 2022). Therefore, the required improvements and updates can be carried out effectively. Having defined the Apple Mac OS as more viable compared to the MS Windows OS, the following are some recommendations that can help improve the MS Windows OS; Multi-factor authentication adds a layer of Security to the authentication process by seeking several credentials to enable the user to log in (Gray, 2022). Moreover, the Firewall of the MS Windows OS can be improved to a Full-built-in version to ensure that the entire and not part of the hard disk is encrypted. Finally, MS Word OS is slow regarding the release of security patch commands; hence, the processor of the system can be improved to speed up the patching process.

Part 2: The Protection Matrix used by both Microsoft Windows Operating System and Apple Mac OS

Protection of the Operating System generally refers to the control of access of programs, processes or users to a system’s resources by use of a common approach. The algorithms used to secure devices that use MS Windows OS and the Apple Mac OS differ depending on the OS (Cocca, 2022). However, both OS employ the same protection matrix to ensure that resources in the computer system are protected.

The protection matrix of MS Windows OS and Apple Mac OS is designed and developed to provide a flexible and holistic system that controls and monitors how information across various programs and systems is accessed. Cocca, (2022) explains that the matrix ensures that the system administrators permit access at different entry levels in a safe and secure manner, thus, protecting sensitive data and information from unauthorized access. The protection matrix consists of rows and columns that represent the resources of the system as well as the various users of information in the system respectively. At the intersection point between the rows and columns, the access point is situated and referred to as Access Control Entry (ACE). At this point, the system can identify the user’s access to a particular resource in the system (Cocca, 2022). Only authorized users can access any help in the system by assigning specific permissions and restrictions to each Access Control Entry. The protection matrix of MS Windows OS and Apple Mac OS is divided into four primary parts.

Object Types

This portion of the protection matrix keeps records of all types of information, referred to as objects protected by the system. Files, folders, passwords, login credentials, and printers are some of the various things identified in this section of the projection matrix (Pankaj, 2022). Having been recognized as an object in the computer system, each object is attached to a personal identifier, a security identifier (SID) used to track access control entries for that object.

Permissions

Permissions refer to various commands that can be assigned to multiple users of each object type. The permissions part is the second section of the Protection matrix of the MS Windows OS and ensures that the proper command id is granted to each object (Pankaj, 2022). Permissions include editing, deleting, writing, print among others.

Users and Groups

This is the third portion of the projection matrix of the MS Windows OS. This portion identifies and lists the users and groups that can access the system’s resources. User accounts, groups and built-in accounts, which include the administrator and system accounts, are identified and assigned a personal security identifier to monitor the access control entries of that particular user or group (Pankaj, 2022). For example, when logging in to an MS Windows OS, the system seeks to identify the user as administrator, regular or guest. A SID is assigned to the user, and then the history of access points is stored in the system.

Access Control Entries

The point of intersection between the system’s resources and the system’s users is known as the access control entry. When the user sends a particular command to the system, the ACE specifies the specific type of access required by the user, and then, directs the particular object type to carry out the command (Pankaj, 2022). Permissions, conditions, requirements and restrictions associated with a specific object are processed at this access point.

Microsoft Windows OS or Apple Mac OS? Which one is better?

Both MS Windows OS and Apple Mac OS are equipped with similar protection matrices to monitor and control the access of resources in computer systems. However, the effectiveness of the protection matrix directly depends on the algorithms of Security integrated into the operating system. For example, when creating and deleting objects, the protection matrix of both Operating systems is the same (Grimes & DeAgonia, 2018). The protection matrix ensures that only authorizauthorized users can assign specific commands to the system to get permission to access certain resources. Moreover, creating and deleting domains in both operating systems is based on similar capabilities.

Domain trusts and user authentication protocols determine the effectiveness of the protection matrix of each operating system (Grimes & DeAgonia, 2018). However, as discussed above, authorization to access certain information is guaranteed through authentication. As discussed earlier, both OS have authentication features that ensure data is secured. However, the Apple Mac OS has a stronger authentication feature known as the iCloud keychain, which uses 256-bit encryption and Elliptic Curve Cryptography to ensure sensitive and confidential resources.

The generation of new permissions to access an object is similar in both OS as they have equal capabilities to ensure the operation of this task. The protection matrix seeks to ensure that permissions are assigned at a granular level and that users are permitted to carry out only the necessary actions linked to a specific task. Silberschatz, Galvin & Gagne (2018) explain that in the MS Windows OS, permissions are accessed at a granular level through the Security Descriptor Definition Language (SDDL), which allows for the creation of security descriptors that define access control for objects such as files and folders. The POSIX model in the Apple Mac OS allows for the creation of Access Control Lists (ACLs) that define and interpret the permissions for the required resources.

The revocation of existing permissions is similar in both MS Windows OS and Apple Mac OS as they seek to ensure that licenses are revoked if the user is no longer authorized to access specific resources. In MS Windows OS, permissions and commands are revoked by modifying the security descriptor of the secured object by employing the Security tabs properties (Silberschatz, Galvin & Gagne, 2018). Permissions to certain users can be modified at this point. The access control list (ACL) of a specific resource in the Mac OS can be modified using the chmod or chown command tools to revoke access to resources by certain or unauthorized users.

Enhancing the Protection of Operating Systems

The protection of Operating Systems of computer systems can be enhanced to meet the everyday changes in the operation of the OS. First of all, auditing and carrying out regular updates are crucial in addressing any security gaps that might exist in the protection matrix of the OS. Moreover, a history record to identify the permissions granted can be resourceful in detecting and carrying out investigations of security breaches. Role-based access control is another strategy that can be used to enhance the protection of operating systems. Role-based access control ensures that only the required tasks are accessed by users, hence, they seek permissions from objects that are only relevant to their jobs. Finally, application whitelisting ensures that only the relevant applications are running in the system to ensure that only the required resources are accessed.

Conclusion

The MS Windows and Apple Mac OS employ various algorithms and matrices to enhance the Security and protection of resources in the device systems. These algorithms and matrices only ensure that resources are secured, and access to these resources is controlled and monitored effectively. The security algorithms of both OS differ; however, the protection matrix is the same. However, the Apple Mac OS is seen to have an enhanced security algorithm model due to enhanced features such as key chain, File Vault encryption among others. However, multi-factor authentication, a full-built-in version and an improved processor are some features that can be added to the security algorithm of MS Windows OS to improve its effectiveness and efficiency.

References

Adekotujo, A., Odumabo, A., Adedokun, A., & Aiyeniko, O. (2020). A Comparative Study of Operating Systems: Case of Windows, UNIX, Linux, Mac, Android and iOS. International Journal of Computer Applications176(39), 16-23.

Cocca, G. (2022, April 18). Windows vs MACOS vs Linux – Operating system handbook. freeCodeCamp.org. https://www.freecodecamp.org/news/an-introduction-to-operating-systems/

Edge, C., & Trouton, R. (2023). The evolution of Apple device management. In Apple Device Management: A Unified Theory of Managing Macs, iPads, iPhones, and Apple TVs (pp. 1-60). Berkeley, CA: Apress.

Gray, H. (2022, July 6). MACOS vs Windows security: A detailed analysis. Hexnode Blogs. https://www.hexnode.com/blogs/macos-vs-windows-security-a-detailed-analysis/

Grimes, R., & DeAgonia, M. (2018, April 6). https://www.idginsiderpro.com/article/3267893/microsoft-windows-10-vs-apple-macos-18-security-features-compared.html

Malallah, H., Zeebaree, S. R., Zebari, R. R., Sadeeq, M. A., Ageed, Z. S., Ibrahim, I. M., … & Merceedi, K. J. (2021). A comprehensive study of the kernel (issues and concepts) in different operating systems. Asian Journal of Research in Computer Science8(3), 16-31.

Nisan, N., & Schocken, S. (2021). The elements of computing systems: building a modern computer from first principles. MIT Press.

Pankaj, P. (2022, January 28). Difference between Windows and MACOS. GeeksforGeeks. https://www.geeksforgeeks.org/difference-between-windows-and-macos/

Sandoval, S., & Thulasiraman, P. (2019, April). Cyber security assessment of the robot operating system 2 for aerial networks. In 2019 IEEE International systems conference (SysCon) (pp. 1-8). IEEE.

Silberschatz, Galvin & Gagne. (2018). Department of Computer Science at Hunter College – TBW. https://www.compsci.hunter.cuny.edu/~sweiss/course_materials/csci340/slides/chapter17.pdf

Srinivasan, P., & Vengatesan, K. (2023). MULTILEVEL SECURITY MODEL IN INTRUSION DETECTION AND PREVENTION SYSTEMS WITH DIFFERENT CRYPTOGRAPHY ALGORITHMS. Journal of Advances in Management1(01).

 

Don't have time to write this essay on your own?
Use our essay writing service and save your time. We guarantee high quality, on-time delivery and 100% confidentiality. All our papers are written from scratch according to your instructions and are plagiarism free.
Place an order

Cite This Work

To export a reference to this article please select a referencing style below:

APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics