Q

Beta flaws vs. security flaws

Security expert James Turnbull explains why beta flaws can be mistaken for security threats and compares desktop security between Linux and Windows.

How safe is Windows' Vista? How much safer is the Linux desktop, in comparison?
To be honest I've steered clear of Windows Vista. I don't like beta products at the best of times and previous experiences with beta versions of Windows XP have ended in disaster. This often has little to do with security and more to do with stability. Any new product, no matter who the vendor, tends to have flaws. Mostly because it is impossible to test for all contingencies, for all hardware and in combination with all software. As a result, I am sure Windows Vista will have functionality, stability and security flaws when it is first released.

Is a Linux desktop more secure? Well yes and no. It depends on which desktop you chose, how you configure it and what you do with it. In the past, Windows desktops often came installed, by default, with some very poor security controls. For example, there was no default firewall and no requirement to use a password. Some of these deficiencies have been corrected in XP and it is my understanding that these controls will be further enhanced...

in Vista.

In comparison, it is my opinion that most Linux desktops tend to be more secure due to things like firewalls and password installation by default, in terms of their base configuration. But in both cases you can configure, harden and lock down Windows and Linux-based desktops to ensure a higher level of security than they come with. As a result, it is very hard to say which is the more appropriate option, especially if you ignore the other factors in selecting a desktop -- cost, user skills, manageability and functionality.

My recommendations is to configure the appropriate desktop for your environment that provides a secure setting at an appropriate cost and won't compromise your user's ability to perform their required functions.

This was first published in August 2006

Dig deeper on Linux system security best practices

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchDataCenter

SearchServerVirtualization

SearchCloudComputing

SearchEnterpriseDesktop

Close