Question

What is you opinion regarding which systems are safer: mac or Windows? As a mac user...

  • What is you opinion regarding which systems are safer: mac or Windows?
  • As a mac user have you considered the safety of your data?
  • What known threats have impacted computers with macOS? Be specific.
  • What is the testing process for application to be approved for the Apple/iTunes store?
  • Can you really only install software approved by Apple on your computers or mobile devices?
  • Is there third party anti-virus available for macs? What are some of their features? Is there one that you would recommend to a mac user?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

It is an often-heard view that macOS computers don’t need antivirus protection. Whilst it is certainly true that the population of macOS malware is tiny compared to that for Windows and Android, there have been instances of macOS malware getting into the wild. Moreover, Apple Mac security needs to be considered in the wider context of other types of attacks.

In addition, it should be noted that Apple themselves ship some anti-malware capabilities within macOS. Firstly, there is “Gatekeeper”, which warns when apps without a digital signature are run. Then, there is “XProtect”, which checks files against known-malware signatures. Finally, apple provide MRT (Malware Removal Tool). Gatekeeper and MRT are essentially invisible to users and have no direct user interface for the user. System updates are installed automatically using the update process. Despite the built-in capabilities, some security experts recommend strengthening the defences by adding in a third-party antivirus package. There are many good reasons for this. Firstly, the approach taken by Apple might be adequate for well-established malware but might not respond quickly enough to emerging threats. Secondly, you might want a broader base of malware evaluation.

Some vendors’ macOS security products can detect malware aimed at other operating systems too. Hence an AV program on your macOS computer could effectively handle Windows and Android malware too. Of course, there is no method by which Windows or Android malware could directly infect a macOS device. However, there are scenarios where you might well benefit from scanning for such threats. For example, if you are given a USB stick of photos by one friend, who asks you to make a copy for a second friend. They both use Windows, but you are using a macOS computer. There is Windows malware on the USB stick, and you make a copy of all the files. In this scenario, it is useful to be able to ensure that malware is not inadvertently passed on from one friend to another, even if your own machine is not at risk.

Mac security programs can offer other capabilities too. For example, browser extensions can identify web sites which are potentially phishing locations. Readers should note that Mac users are just as vulnerable to phishing attacks as users of e.g. Windows, as phishing sites function by deceiving the user rather than by altering the operating system or browser.

Other packages might offer VPN (virtual private network) capabilities which can be very useful when you need to operate your computer in an untrusted environment, like a public location, internet café or another place where you are not sure of the integrity of the connection. You might also want to replace macOS’ built-in parental control capabilities with third-party tools, if you believe this is more appropriate to your family needs.

Before purchasing a Mac security solution, you also need to decide on the size and scope of the protection you wish to deploy. It might be for a single computer, or to a laptop and desktop. Or you might have a family environment. There might be a mixture of macOS laptops and desktops, but also other devices too like Windows desktops and laptops, along with iOS and Android phones and tablets. For this environment, a broader and more flexible licensing package might well be appropriate.

This could allow you to purchase e.g. 5 licenses and then distribute them amongst your collection of devices. It could also give you the flexibility to transfer licensing from one device to a new item, e.g. if you need to replace an ageing Windows laptop with a new MacBook. Some packages offer cloud-based management interfaces. Usually, this is to cover the licensing of the packages, but some can also be used to initiate malware scans and device updates and manage parental control capabilities.

Then there are packages which are really aimed at the business and corporate space. Here the macOS support is but one component of a much larger deployment and management infrastructure. This will cover all devices and operating systems, often running thousands of managed devices. Although it might be tempting to go for a larger and stronger solution than is appropriate for your organizational size, be aware that the larger platforms have a significant up-front design, management and deployment overheads. This is required to allow these tools to scale to the sizes that they can support, and they usually bring in a level of day-to-day commitment which, although entirely proper and required in a larger enterprise, is simply beyond the capabilities and resourcing of a small company.

Experienced and responsible Mac users who are careful about which programs they install, and which sources they obtain them from, may well argue – very reasonably – that they are not at risk from Mac malware. However, we feel that non-expert users, children, and users who frequently like to experiment with new software, could definitely benefit from having security software on their Mac systems, in addition to the security features provided by the Mac OS itself. Readers who are concerned that third-party security software will slow their Mac down can be reassured that we considered this in our test; we did not observe any significant performance reduction during daily operations with any of the programs reviewed.

As with Windows computers, Macs can be made safer by employing good security practices. We recommend the following:

  1. Do not use an administrator account for day-to-day computing
  2. Use a sandboxed browser such as Google Chrome
  3. Uninstall/disable the standalone Flash Player
  4. Uninstall/disable Java unless it is essential for you
  5. Keep your Mac operating system and third-party software up-to-date with the latest patches
  6. Use secure passwords (the Mac includes the KeyChain password manager)
  7. Deactivate any services such as Airport, Bluetooth or IPv6 that you don’t use
  8. Be careful about which programs you install and where you download them fro
Add a comment
Know the answer?
Add Answer to:
What is you opinion regarding which systems are safer: mac or Windows? As a mac user...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Chapter 3 Information Systems, Organizations, and Strategy 103 INTERACTIVE SESSION: TECHNOLOGY IS...

    Chapter 3 Information Systems, Organizations, and Strategy 103 INTERACTIVE SESSION: TECHNOLOGY IS THE IPAD A DISRUPTIVE TECHNOLOGY? Tablet computers have come and gone several timesdistribution. Amazon has committed itself to offering before, but the iPad looks like it will be different It the lowest possible prices, but Apple has appealed has a gorgeous 10-inch color display, a persistent Wi publishers by announcing its intention to offer a Fi Internet connection, potential use of high-speed tiered pricing system, giving publishers the...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • 1. In what ways was Microsoft’s behaviour (a) against the public interest; (b) in the public...

    1. In what ways was Microsoft’s behaviour (a) against the public interest; (b) in the public interest? 2. Being locked in to a product or technology is only a problem if such a product can be clearly shown to be inferior to an alternative. What difficulties might there be in establishing such a case? etwork effects Microsoft is a vertically integrated firm (see page 87), with a dominant position in the operating system market (i.e. Windows) and in certain application...

  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions...

    Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions listed below in specific detail. A minimum of 4 pages is required; ensure that you answer all questions completely Case Questions Who are the main players (name and position)? What business (es) and industry or industries is the company in? What are the issues and problems facing the company? (Sort them by importance and urgency.) What are the characteristics of the environment in which...

  • Wanted by the Police: A Good Interface By KATIE HAFNER NOV. 11, 2004 From: The New...

    Wanted by the Police: A Good Interface By KATIE HAFNER NOV. 11, 2004 From: The New York Times, Technology section, not-for profit classroom used. SAN JOSE, Calif. - SAN JOSE has a reputation as one of the safest large cities in the nation, with the fewest police officers per capita. Yet a number of the 1,000 officers in this city of 925,000 in the heart of Silicon Valley have been worrying about their own safety of late. Since June, the...

  • 1) analyze the following case 2) give a summary and suggest ways for the company ——————...

    1) analyze the following case 2) give a summary and suggest ways for the company —————— Salesforce.com, one of the most disruptive technology companies of the past few years, has single-handedly shaken up the software industry with its innovative business model and resounding success. Salesforce provides customer relationship management (CRM) and other application software solutions in the form of software as a service leased over the Internet, as opposed to software bought and installed on machines locally. The company was...

  • What are your top 3 takaways from this article? It’s always tempting to see the present...

    What are your top 3 takaways from this article? It’s always tempting to see the present moment as the peak of chaos and disruption, whether we’re talking about politics or just how those teenagers behave today. The same is true in marketing, because in many ways that profession is always in a state of chaos and disruption. But I don’t think it’s hyperbole to apply “peak chaos and disruption” to social media marketing in the first quarter of 2018. Let’s...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT