Student Name: Yanjan Kunwar
Student ID: 16150554
Assignment Due Date: 11th July 2025 - 18:00
Assignment Submission Date: 11th July 2025
Word Count: 2017
Table of Contents
Introduction .................................................................................................................................... 3
Part 1: Operational Management of Operating Systems ................................................................ 4
Section 1: Process and Service Management ............................................................................. 4
Section 2: File System Management ........................................................................................... 6
Section 3: User Account and Access Control Management ........................................................ 8
Section 4: Memory Management ............................................................................................... 9
Part 2: Security Risks and Management Strategies ...................................................................... 10
Section 1: Security Risks in Operating Systems ......................................................................... 10
Section 2: Security Management and Mitigation Strategies .................................................... 11
Conclusion ..................................................................................................................................... 13
References ..................................................................................................................................... 14
Introduction
The core software which controls hardware resources while offering services to
applications and users is known as an operating system (OS). It functions as a resource
manager to ensure all systems including memory processors storage devices and
networking systems operate effectively and safely. This report investigates management
approaches together with security protocols for Linux and windows operating systems as
well as windows server. These operating systems operate within both business
infrastructure systems and individual personal computers. The report discusses
operational management features through a breakdown of process handling and file
systems and user account management and memory handling. This paper assesses
security vulnerabilities which affect each operating system along with defensive measures
organizations have established for risk mitigation. The evaluation between operational
and security practices for these systems will establish their strengths and weaknesses in
various computing environments. (Silberschatz, 2018)
Part 1: Operational Management of Operating Systems
Section 1: Process and Service Management
Definition and Importance
An operating system (OS) functions as the fundamental software that manages computer
hardware elements while delivering services to user applications. The operating system
operates as a resource manager to ensure memory processors storage devices and
networking systems maintain proper functioning and safety. This study examines security
and management strategies for the three widely used operating systems which include
Linux and Windows and Windows Server. (Silberschatz, 2018) The operating systems
operate within both enterprise structures and personal computer environments. The
report explores operational management aspects through an analysis of process
management and file systems and user account systems and memory administration.
The paper evaluates security vulnerabilities that affect each operating system as well as
protective measures organizations have implemented to prevent threats. The evaluation
of operational and security practices between these systems will reveal their respective
benefits and limitations in multiple computing environments. (The Linux Kernel
documentation — The Linux Kernel documentation, n.d.)
Management Techniques
•Linux: The Linux operating system duplicates the parent process through the fork()
system call to create new processes. Linux uses ps for viewing processes and top for
system performance observation and kill for process termination. Systemctl operates as
a tool for managing services through its ability to activate or deactivate network services.
System administration becomes more accessible through the use of graphical tools
including GNOME System Monitor. (Karl-Bridge-Microsoft, 2021)
•Windows: Windows systems initiate new processes through CreateProcess() API which
enables users to track these processes using Task Manager or execute CLI commands
like tasklist. The Services application together with the sc command provides users with
the ability to control and configure services through manual operations. The command sc
start W32Time enables the Windows Time service to start.
•Windows Server: The Windows Server operating system includes all standard windows
functions and advanced tools such as Server Manager and PowerShell for its operation.
Through these tools administrators can perform service and process administration
across their enterprises. The PowerShell Restart-Service command enables
administrators to restart services while other tasks remain unaffected. Windows server
implements enterprise features which include clustering capabilities that ensure high
availability and load distribution between various systems.
Key Differences and Significance
Linux stands out because it offers flexibility and efficiency for environments that need
scripting and remote management capabilities. The primary focus of Windows operates
as user-friendly accessibility which suits general consumer needs. The enterprise-
focused capabilities of Windows Server extend beyond standard windows accessibility
through features that enable network management and scalability at an enterprise level.
Linux uses a lightweight fork() system call for process creation but Windows implements
CreateProcess() with built-in security descriptor functionality. Linux achieves superior
control capabilities which make it ideal for specific system requirements yet Windows
provides an intuitive user interface for everyday usage.
A well-managed process ensures the CPU operates at maximum capacity thus providing
improved system performance and faster response times. When processes receive
proper management organizations enable seamless multitasking which produces better
user interactions.
Section 2: File System Management
File System Structure
Data organization methods differ between operating systems thus understanding their file
system structures is essential for system management and data security.
• All Linux directories and files are structured as a single-root directory system starting
from (/) which uses a tree organization. Important directories are /home which stores
information about a user, /etc which stores configurations of a system and /bin which
contains essential executable programs. The most widely used is the ext4 file Linux:
system that has journaling to support crash recovery and inodes to store metadata. Linux
file system design provides straightforward system management and efficient resource
allocation capabilities.
•Windows: The operating system divides storage space into separate drives which
receive labels as C:, D:, etc. All drives maintain three main directories that include
Program Files, Users and Windows. Windows uses NTFS (New Technology File System)
as its standard file system which provides encryption capabilities along with compression
and access control features. NTFS uses the Master File Table (MFT) to monitor all files
and directories which results in improved system performance and file integrity.
•Windows Server: Windows Server primarily implements the Resilient File System
(ReFS) instead of NTFS for its data integrity and scalability features. An enterprise
environment benefits from ReFS since it maintains system uptime and data accessibility
throughout operations. The system features automatic error detection along with auto-
correction which are vital components for virtualized networks and big-scale systems.
Permissions and Security
•Linux: The file system rights management in Linux uses chmod to define read write and
execute permissions for user groups and other users. The system administrators use this
basic model to maintain access control. High-security environments benefit from
advanced security mechanisms such as SELinux to establish more restrictive access
policies.
•Windows: Windows uses Access Control Lists (ACLs) as the method to handle file
permissions. The administrator can use ACLs to grant specific permissions such as read
or write or execute to authorized users. Users can modify these settings either through
File Explorer or by using command-line tools including icacls.
•Windows Server: Windows Server extends the Windows ACLs by integrating Role-
Based Access Control (RBAC) through Active Directory (AD). The centralized
management tool allows administrators to grant roles to users while defining network
actions they can perform. Permission management becomes simpler in large-scale
environments through this centralized approach.
File Management Methods
These systems employ both command-line and graphical interfaces when managing files.
Linux users perform advanced file management operations through CLI tools including
mkdir and rm but Windows depends on the File Explorer graphical interface and uses dir
and md commands for file operations. The file management tools of Windows Server offer
both command-line interface and graphical user interface features which add capabilities
for file sharing and network access control to manage files across different machines.
Section 3: User Account and Access Control Management
Windows users need to access the Control Panel or perform the net user command from
the command line to create user accounts. UAC presents security-enhancing prompts for
privilege elevation during administrative operations.
Access Control Models
The Linux operating system implements Discretionary Access Control (DAC) by default
because users who own files get to determine access permissions. SELinux introduces
mandatory access control which strengthens system security through its integration.
Windows and Windows Server systems implement DAC and Role-Based Access Control
(RBAC) as their access control models. RBAC implements resource access control
through group policies and AD which grants users access only to their designated roles.
The approach enhances security measures within organizations that have large
structures. (Red Hat Enterprise Linux, 2025)
Access control demonstrates importance in system security.
An access control system protects valuable information from unauthorized access
attempts. The Windows Server RBAC system restricts user-caused damage because
users who feel dissatisfied or act maliciously have limited capabilities. Operating systems
protect data integrity through role-based access control which grants users only
necessary resources for their tasks thus preventing unauthorized modifications.
Section 4: Memory Management
Memory Management Concepts
Memory management represents an essential operating system function that allocates
memory space to running processes while managing virtual memory operations. The
proper management of memory allows systems to maintain their responsiveness even
when multiple applications run simultaneously.
•Stack and Heap: The stack is used for managing function calls, while the heap is used
for dynamically allocated memory.
•Paging: Memory allocation in Paging requires fixed page division followed by disk-based
swapping operations when needed.
•Segmentation: Segmentation organizes memory into logical sections, such as data,
code, and stack, to optimize memory usage.
OS-Specific Techniques
Linux implements demand paging combined with copy-on-write methods to reduce
memory consumption. The Completely Fair Scheduler (CFS) manages process CPU time
distribution to achieve fair execution of multiple tasks. (CFS: Completely fair process
scheduling in Linux, n.d.)
Windows uses a paging file to manage memory overflow. The system employs the
Multilevel Feedback Queue (MLFQ) algorithm to prioritize processes based on their
behavior, optimizing desktop performance.
The Windows Server employs Non-Uniform Memory Access (NUMA) which improves
memory distribution in systems with multiple processors to enhance virtualization and
server performance.
Significance
Operating systems become able to execute several applications at once when memory
management operates effectively despite memory restrictions. Large applications
become possible through virtual memory paging which moves inactive pages to disk
storage so active processes can use the available RAM.
Part 2: Security Risks and Management Strategies
Section 1: Security Risks in Operating Systems
Common Risks
•Linux: Linux systems are vulnerable to two primary security threats which include
rootkits and privilege escalation attacks. The OpenSSL vulnerability CVE-2023-0286
enabled attackers to gain elevated system permissions. Because Linux operates as open-
source it requires constant security updates to address detected system vulnerabilities.
•Windows: The Windows operating system serves as a preferred target for malware
attacks which consist of viruses, ransomware and spyware. The vulnerability CVE-2023-
23397 within Outlook software demonstrates the risks that come from utilizing common
applications. Because of its widespread usage Windows faces major security threats from
attackers. (Silberschatz, 2018)
•Windows Server: RDP exploits which include CVE-2023-21554 enable attackers to
obtain remote access which results in the compromise of enterprise data. The security
risks affecting server systems need advanced security protocols for proper protection.
Impact of Risks
Security vulnerabilities pose severe risks that result in system crashes and unauthorized
access to sensitive data as well as data loss. Ransomware attacks render critical files
inaccessible while privilege escalation attacks enable attackers to gain complete control
of the system which creates potential long-term security vulnerabilities.
Section 2: Security Management and Mitigation Strategies
Security Practices
Operating systems need to issue periodic updates that fix security holes to maintain
system security. The apt update tool on Linux operates for system security while Windows
Update functions on Windows. System protection requires periodic updates to stop
attackers from using known vulnerabilities against the system. (Why keeping your
software up to date is important for cybersecurity?, 2024)
Snort (for Linux) and Defender ATP (for Windows) act as intrusion detection systems
which track system activities for suspicious behavior and potential threats. These tools
play a crucial role in detecting attacks early.
Security Audits use Nessus as a tool to detect system weaknesses which prevents their
exploitation by potential attackers. Regular auditing ensures that the system remains
secure and compliant with security standards.
Security Tools
Firewalls act as security barriers which use iptables on Linux and Windows Firewall to
stop unauthorized network traffic and protect the system from potential attackers.
The Linux version of ClamAV together with Windows Defender provides real-time
protection against malware and other malicious threats. (GeeksforGeeks, 2025)
Role of Security Management
Security management practices based on effectiveness help organizations prevent
system breaches through active threat mitigation strategies. Firewalls and intrusion
detection systems and antivirus software defend against attacks but regular audits and
patch management enable organizations to address vulnerabilities before they become
attackable.
Conclusion
Each operating system between Linux, Windows, and Windows Server brings distinctive
operational management capabilities along with security features to the table. Linux
provides high performance with flexible features while Windows delivers user-friendly
operations and Windows Server delivers scalability and enterprise management features.
Operating systems require proper management and security measures to achieve
performance optimization and protect against security risks. Every operating system
needs proper management to protect data and maintain system stability in the constantly
evolving digital world.
References
CFS: Completely fair process scheduling in Linux. (n.d.). Retrieved from Opensource.com:
https://opensource.com/article/19/2/fair-scheduling-linux
GeeksforGeeks. (2025, May 4). How to Configure your Linux Firewall - 3 Methods. Retrieved
from GeeksforGeeks: https://www.geeksforgeeks.org/how-to-setup-firewall-in-linux/
Karl-Bridge-Microsoft. (2021). Processes and Threads - Win32 apps. Retrieved from Microsoft
Learn: https://learn.microsoft.com/en-us/windows/win32/procthread/processes-and-
threads
Red Hat Enterprise Linux. (2025, July 10). Retrieved from Chapter 2. Introduction | Security-
Enhanced Linux | Red Hat Enterprise Linux | 6 | Red Hat Documentation:
https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/6/html/security-
enhanced_linux/chap-security-enhanced_linux-introduction
Silberschatz. (2018). Laurie Rosatone. Retrieved from https://os.ecci.ucr.ac.cr/slides/Abraham-
Silberschatz-Operating-System-Concepts-10th-2018.pdf
The Linux Kernel documentation — The Linux Kernel documentation. (n.d.). Process
management. Retrieved from The Linux Kernel: https://docs.kernel.org/
Why keeping your software up to date is important for cybersecurity? (2024, May 14). Retrieved
from University of Idaho - Knowledge Base:
https://support.uidaho.edu/TDClient/40/Portal/KB/ArticleDet?ID=2770