한국   대만   중국   일본 
NewsFactor Network - - How Secure Is OS X?
The Wayback Machine - https://web.archive.org/web/20051121090415/http://www.newsfactor.com:80/story.xhtml?story_title=How_Secure_Is_OS_X_&story_id=23467
FIND:    


Subscribe to NewsFactor Magazine


November 21, 2005
Updated Daily

Home/Top News
Enterprise
Hardware
Enterprise Security
Data Management
Mobile Enterprise
Mac
Tech Trends
E-Commerce
Internet Life
Personal Technology
Science & Innovation
Business Briefing
NewsFactor Magazine
Blog Bytes

Get your complimentary issue
See what's inside (free registration)
Change your address
Free Newsletters
Top Tech News
 
CRM Alert
 
Wireless Industry Alert
 
Enterprise Security Report
 
Data Storage Report
 
BPM Industry Alert
 

advertisement


NewsFactor Top Tech News
NetSuite: CRM, Accounting & More

How Secure Is OS X?

How Secure Is OS X?
What is the big picture when it comes to Apple security? Is OS X safe enough to be a viable contender for running public Web sites and general enterprise applications?


Find out how actual customers deploy 3Com?s best in class enterprise security, VoIP and networking solutions. 3Com: Advance the network.


To many Mac users, the recent news report of an Apple OS X Latest News about OS X security Relevant Products/Services from Messagelabs vulnerability seemed like an anomaly. While Windows users are greeted almost weekly with a new virus or worm, OS X users tend to view their systems as impervious to such concerns.

The steady stream of Windows bugs is a phenomenon far removed from their computing experience -- or so it seems. But the late February security report cast Apple in a new light.

Chris Adams, a systems administrator in San Diego, discovered a flaw in the Apple Filing Protocol (AFP), a tool in OS X 10.3, code-named "Panther." AFP enables a secure connection using the secure shell (SSH) protocol. The flaw is in AFP's warning mechanism: Users may request a secure connection, but Panther will not warn users if the connection is in fact not a secure one. So, a user may send sensitive information -- like passwords -- on an insecure connection, not knowing that they are using an easily hacked protocol.

In short, the flaw is similar to a host of Windows flaws, suggesting that the concept of Apple invulnerability may be closer to myth than fact. That said, What is the big picture when it comes to Apple security? Is OS X safe enough to be a viable contender for running public Web sites and general enterprise applications?

Peer Review

Apple's OS X is based on Berkley secure distribution (BSD), a Unix variant. OS X is "a version of Unix, with an Apple personality on top of it," IDC analyst Dan Kusnetzky told NewsFactor.

That could be the source of some security vulnerabilities for OS X. Because the Unix code has been public for so long, hackers are well positioned to exploit its weaknesses. Indeed, the existing hacks of OS X, for the most part, have been adaptations of Unix hacks, noted Gartner Latest News about Gartner analyst Ray Wagner, though he pointed out that such attacks have been rare.

Yet, Wagner is in the camp with those who believe just the opposite about OS X: "The more eyes that look at code, the more chances that vulnerabilities will be caught and fixed by the good guys," he told NewsFactor. "It's not possible for one person to write an operating system, so I can't get the most security-conscious person on earth to go and write an OS -- it has to be done by a team, and the more peer review, the better."

"Any security issues that have come up in the version of BSD upon which [Apple] based their efforts would also very likely be in the Apple product," Kusnetzky said, but he said that he had not heard of such hacks.

OS X's Unix underpinnings mean it is "probably far more secure" than earlier Mac OSes, Jupiter analyst Michael Gartenberg told NewsFactor. "Previous Mac OSes were not overly robust in terms of withstanding attacks. If you tried to attack a system 7 Mac in its heyday, it would probably have crashed before you got into it."

The Network Age

One of the chief security problems facing Microsoft Relevant Products/Services from Microsoft, experts say, is that it was created prior to the age of the Internet. Before mass public networking, code was not exposed to the amount and sophistication of attacks that today's networked software is. Although many recent Windows OSes are post-Internet, "there's still a legacy code base," Wagner noted.

Code developed after the rise of the Internet is built with that environment in mind. "Certainly, OS X falls into this category," Wagner said.

"So you've got newer operating systems designed with the best principles of the mid '90s as opposed to the mid '80s," he said. "People thought about security more -- they designed thinking about security more from a ground up perspective."

In contrast to OS X, earlier Mac OSes were built when "connected computing meant hooking six computers together via AppleTalk to a laser writer," Gartenberg said. "You're clearly talking far more overall security than any previous effort."

Security Through Obscurity

If Windows-based enterprises were to use non-Windows systems -- like OS X -- on at least certain hardware in their system, they would gain "security through obscurity," Wagner suggests.

"Maintaining some corporate users on non-Windows desktops offers a huge advantage, in terms of attack avoidance, because the most popular target for virus and worm writers will always be the consumer desktop," he says in a security report.

As Gartenberg notes, "The fact that Apple is not in as many hands as Windows means there are fewer people trying to exploit those vulnerabilities in the marketplace."

There is "no question" that its low profile is the biggest factor behind the low amount of attacks on the OS, Wagner said, also pointing out that Apple tends to inspire less animosity in the hacker Latest News about hacker community than Windows.

This low profile alone does not make OS X a safe bet for corporate Web sites. "If Windows with its known vulnerabilities has proven good enough for corporate use, OS X is certainly as good as that standard, if not better in certain ways," Gartenberg said.

advertisement


  More on this topic...
1. EPA Planning New Fuel Economy Tests
2. UK Spammer Gets Six-Year Sentence
3. 'Fear Gene' Removed from Mice
4. Butterfly Wings Composed of Living Color
5. GM Boss Denies Bankrupty Rumors


advertisement


  Most Popular Articles
1. Feds Take Aim at Spyware Operation
2. Review: Toshiba Tecra S3 Notebook
3. Fujitsu Set To Debut Dual-Core Servers
4. The Latest and Greatest Smartphones
5. HP To Launch Itanium 2 Blade Servers


advertisement
Have an informed opinion on this story?
Send a Letter to the Editor .
We want to know what you think.
Send us your Feedback .

 Related Stories  Latest News & Special Reports
Product Review: The iBook G4
(13-Feb-04)
Controversy Erupts over Apple Safari Update
(4-Feb-04)
Hidden Costs of Mac Ownership
(18-Dec-03)
Mac vs. PC: The Truth About TCO
(22-Nov-03)
Apple Fixes Flaws - for Panther Users Only
(30-Oct-03)
  Six Plead Guilty for Role in ID Theft
  Sony DRM Accused of License Violation
  Can Open Source Defeat Microsoft?
  U.N. Begins $100 Laptop Initiative
  Congress: U.S. Net Control Inviolable
  Google Gets Nod for Local Wi-Fi Project
  Report: Internet TV One Step Closer
 Sponsored Links

Process Rules: Getting More from BPM with a Business Rule Engine.

Secure your backup media with Brink?s. Download FREE White Paper

TARGUSinfo ? On Demand data about the people contacting you.

Take the BPM Process Review & enter to win a $200 AMEX Gift Cheque.

Experience CRM Success with Salesforce.com.

Best in class enterprise IT solutions from 3Com

Bringing Paper and Online Processes Together for the Common Good.

Grow Faster with NetSuite: CRM, Accounting & More. Free Trial!

Multitask even faster with the HP Compaq Business Desktop dc7600.

Teleportation For The Information Age ? Free Timbuktu Pro Trial!

Bring workers and content together virtually with eRoom.

See how EDS goes further to deliver effective technology service

Make your ITIL implementation successful with a Malcolm Fry WP!

Deliver measurable value now with PlanView Enterprise.

Lower TCO? Get the Facts on Windows Server and Linux.

TLS Medical Products Customer Strategy Summit 2006.

Free special reports about CRM from Oncontact Software.

BZ Research names JBoss #1 for J2EE application servers.

TIBCO is a recognized leader in BPM. Find out why.

Find out how business process management helps you work smarter.

Living in L.A.? Click here for Sales, Journalism & I.T. JOBS.

White Papers
Secure your backup media with Brink?s. Download FREE White Paper

How Mid-Market Firms Can Create a Real-Time Enterprise.

Read a white paper about best in class VoIP solutions from 3Com.

Ticketmaster's World-Class Customer Solutions with TARGUSinfo®

The Case for BPM - How BPM brings real business results.

More White Papers...

Security Spotlight

Hackers Exploit Secret Copy Protections Found on Sony CDs
The can of worms opened by Sony's surreptitious installation of copy-protection technology on its music CDs keeps getting bigger, as malware writers have exploited the vulnerability.

After Criticism, Sony Issues Fix for Hidden Rootkits
Sony has admitted that it included a stealth rootkit on some music CDs shipped in 2005 and has issued an update to remove the hidden software one day after it was discovered.

Review: Symantec Mail Security 8200 Appliance
Symantec's Mail Security 8200 series is a set of hardware appliances designed for those who need reliable and efficient mail security for large networks.
A D V E R T I S E M E N T
Enterprise Hardware Spotlight

Review: Toshiba Tecra S3 Notebook
Most computer users on the market for a new laptop will find something to like about the Toshiba Tecra S3, a versatile machine that performs well with both multimedia and office apps.

Fujitsu Set To Debut Dual-Core Servers
Fujitsu Computer Systems has unveiled new servers powered by dual-core AMD Opteron processors: the Primergy BX630 blade server and the Primergy RX220 rack server.

HP To Launch Itanium 2 Blade Servers
HP this week unveiled its first blade server supporting the HP-UX operating system and powered by Intel's Itanium 2 processor. The new offering targets distributed-computing networks.
A D V E R T I S E M E N T
Navigation
NewsFactor Top Tech News
Home/Top News | Enterprise | Hardware | Enterprise Security | Data Management | Mobile Enterprise | Mac
Tech Trends | E-Commerce | Internet Life | Personal Technology | Science & Innovation | Business Briefing |
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Data Storage Today | Wireless NewsFactor
Enterprise Linux I.T. | Enterprise Windows I.T. | Enterprise Security Today

NewsFactor Network Enterprise Applications Sites
BPM Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2005 NewsFactor Network. All rights reserved.