Secure OS Types

7 minutes
Share the link to this page
You need to purchase the class to view this lesson.
One-time Purchase
List Price:  $139.99
You save:  $40
List Price:  د.إ514.18
You save:  د.إ146.92
List Price:  A$179.52
You save:  A$51.29
List Price:  ৳11,871.62
You save:  ৳3,392.13
List Price:  CA$176.80
You save:  CA$50.51
CHF 88.62
List Price:  CHF 124.08
You save:  CHF 35.45
List Price:  kr855.96
You save:  kr244.57
List Price:  €115.06
You save:  €32.87
List Price:  £102.26
You save:  £29.22
List Price:  HK$1,085.49
You save:  HK$310.16
List Price:  ₹10,223.98
You save:  ₹2,921.34
List Price:  RM566.18
You save:  RM161.78
List Price:  ₦53,126.20
You save:  ₦15,180
List Price:  kr1,183.01
You save:  kr338.02
List Price:  NZ$193.55
You save:  NZ$55.30
List Price:  ₱6,723.08
You save:  ₱1,921.02
List Price:  ₨22,447.39
You save:  ₨6,414
List Price:  S$185.30
You save:  S$52.94
List Price:  ฿4,195.50
You save:  ฿1,198.80
List Price:  ₺1,029.66
You save:  ₺294.20
List Price:  B$728.03
You save:  B$208.02
List Price:  R2,105.83
You save:  R601.70
List Price:  Лв225.56
You save:  Лв64.45
List Price:  ₩153,297.25
You save:  ₩43,802.34
List Price:  ₪446.20
You save:  ₪127.49
Already have an account? Log In


It's really easy for us to think that there's only three operating systems out there. There's Microsoft Windows, there's the Mac OS, and then there's Linux. But in reality, there's a lot more than that. And in this episode, what I want to concentrate on is the concept of what I'm calling secure OS types. Now, before we dive into this too much, what I want to make sure you understand is that these different types I'm about to tell you, this isn't some official law or list. This is just comp Tia's opinion.

In fact, what they're doing is they're giving you examples of different situations with operating systems that they're probably going to be asking questions on. So while I'll say that there's server OS and workstation OS and key ASCO as we'll talk about all this in a moment, the reality is, is that these are not laws of physics either simply comped he has opinions on things. So let's go through these different types of secure OSS. Now, first of all, to me, all OSS are for the most part secure what We're talking about here is what type of operating system do I use in a particular situation? Now, the other thing I want to mention real quick is that in this list come to you mentioned something very strange. They say, a network secure operating system.

There's no such thing. The last time we had something like that was in the early 90s. We had stuff with names like NetWare and Banyan vines. So I'm going to skip that particular one. Hope that I'm right, let me know on the test. Okay, so let's go ahead and get started.

The first one I want to talk about is a server operating system. A server operating system is going to be an operating system version that's designed to support servers. Now, you can take pretty much any operating system and put a web server on it. But when we're talking about custom designed server operating systems, we're talking about, for example, the famous Windows Server, which has extra functionality built in built in DNS built in DHCP, much stronger hardware. support, it can support more CPUs, it has built in raid support for lots and lots of hard drives. Windows Server can support lots more instantaneous connections.

So you can have more than 20, which is a big deal for servers. So there's a lot of features like that that come into play. Certainly windows doesn't have a lock on this even Linux, pretty much every distribution has server versions. And again, they're customized to work with stronger, more robust hardware. They're designed to be able to support lots of lots of different server applications. And they often skip a lot of things that you would see in other ones, you're not going to see very many games in a Red Hat Linux Enterprise Edition server because servers Don't play games.

Now after that is workstations now continue to use the word workstation, but to me, this is going to be the desktop version of things. So windows 10 or Mac OS or a boon to Linux desktop. These are the designed to be the workhorse systems, they're going to have good network functionality, they're going to have reasonably good support for hardware. But like, for example, Windows 10 out of the box, does not support full blown raid. So little things like that, that can make a difference. After that are going to be what I'm going to call embedded systems.

I'm talking about everything from routers, to refrigerators, to cameras. These are individual devices that you don't really you can't add to it Not really. You almost never have a dedicated screen keyboard or a mouse or anything like that. But they are full blown computers, and they are running operating systems. These operating systems can vary dramatically. For example, on my little cameras that I use for security at the house, they're basically just running a very slimmed down version of Linux.

If you're using a Cisco router, then you'll be Running the famous Cisco IOS. And even things like embedded systems for plant processing use a very popular but not really well known operating system called VX works. So all of these different devices also come with their own operating systems. And for the test take the term appliance because that's what we see on the company objectives. Now after that is a kiosk and we've all been to a kiosk. I was just at the Museum of Natural Science here in Houston and the big oil exhibit that they've opened up and it's got kiosks all over the place.

The key asked is going to manifest is little more than some big screen, usually a touchscreen, with very customized interfaces to show people different things. So I was able to move plate tectonics just by pressing buttons at this kiosk. kiosk operating systems, for the most part are almost always going to be slimmed down versions of Linux. There are a few dedicate hated kiosk operating systems. But to be honest, the free price that Linux comes along with makes it very, very attractive for people to use those types of things. He also sometimes will see things like VX works us within a kiosk.

The most important thing is when you're at a kiosk, you don't really know that you're at a computer, it's just a big screen, then you press buttons, and you do fun stuff. Last are going to be the mobile operating systems. And that really boils down to one of two camps, either the Apple iOS or Google Android. I'm an Android guy and don't try to change me. These types of mobile operating systems are custom designed for smart devices in particular phones and tablets. They provide very, very robust experience.

They provide strong interfacing, and a level of security that we never saw until Apple came out with iOS and then much, not much later. We came out with the Google Android, the level of security you have with those compared to say windows 10 is absolutely dramatic. Now, what you need to be thinking about at this point is, when am I going to use these different operating systems? Well, it's easy to go well, I've got a kiosk. So I'm going to use slimmed down version of Linux. But what's more important is you think in terms of two big things, number one, least functionality, whatever scenario they throw at you in the exam, think about which one of these operating systems has the least amount of functionality, but enough to do the job that it needs to do.

Second are secure configurations. any operating system by default has a high degree of security in today's society, you don't have a choice, but you can actually have operating systems that are set up to be a lot more secure. For example, Windows 10 is famous for its phone, home telemetry, anytime you type netstat. You can see all these little calls that Windows 10 is making back to Microsoft, but you can get operating systems that are much more lockdown. There's a secure version of Windows. There's a secure Many secure versions of Linux and even Mac.

Those are listed as a group known as trusted operating systems. Trusted operating system is from the secure computing group. They're the same people who work with things like TPM technology for securing hard drives and such. And they certify usually for large governments, trusted operating systems. They're locked down as much as we possibly can.

Sign Up


Share with friends, get 20% off
Invite your friends to TabletWise learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.