The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Features

The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Features

Art Taylor
Copyright: © 2009 |Pages: 11
ISBN13: 9781599048550|ISBN10: 1599048558|EISBN13: 9781599048567
DOI: 10.4018/978-1-59904-855-0.ch046
Cite Chapter Cite Chapter

MLA

Taylor, Art. "The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Features." Handbook of Research on Information Security and Assurance, edited by Jatinder N. D. Gupta and Sushil Sharma, IGI Global, 2009, pp. 518-528. https://doi.org/10.4018/978-1-59904-855-0.ch046

APA

Taylor, A. (2009). The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Features. In J. Gupta & S. Sharma (Eds.), Handbook of Research on Information Security and Assurance (pp. 518-528). IGI Global. https://doi.org/10.4018/978-1-59904-855-0.ch046

Chicago

Taylor, Art. "The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Features." In Handbook of Research on Information Security and Assurance, edited by Jatinder N. D. Gupta and Sushil Sharma, 518-528. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-59904-855-0.ch046

Export Reference

Mendeley
Favorite

Abstract

With the rise of the Internet, computer systems appear to be more vulnerable than ever from security attacks. Much attention has been focused on the role of the network in security attacks, but evidence suggests that the computer server and its operating system deserve closer examination since it is ultimately the operating system and its core defense mechanisms of authentication and authorization which are compromised in an attack. This chapter provides an exploratory and evaluative discussion of the authentication and authorization features of two widely used server operating systems: Windows and Linux.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.