Before we move on to technical issues, I will remind you that one hundred percent protected from hackers operating system does not exist. That is why, whether you chose Linux, OS X or Windows, the important point is to install applications to ensure security in the selected system. These applications, especially in conjunction with Linux, you increase your chance that even the most experienced hackers will not be able to access your system.
1. Privileges of accounts
In Windows users by default have access to everything in the system because they are given administrator rights. If the virus will be able to penetrate their system, they can quickly gain access to important parts of the system. On the other hand, in Linux, they have a lower access rights, and, theoretically, the virus can only access local files and folders, the system will remain safe.
2. Competent community
Windows and other operating systems are more vulnerabilities to the type of social engineering Ltd compared to Linux. Incompetent users can easily download a virus by simply opening an attachment in e-mail. Of course, this is not the case of Linux, when users are more technically savvy, and are unlikely to access and download such suspicious attachments. They also need to give the rights to execution, so unlikely to happen real damage. Various developers and testers working on Linux, so, as soon as there is some kind of vulnerability, it will be quickly found and fixed, unlike other operating systems.
An even higher level of security on Linux machines is implemented using IPtables. This firewall that allows you to create a more secure environment for the execution of any command or access the network.
4. The separateness of the environment
Linux works in many environments and distros such as Linux Mint, Debian, Ubuntu, Gentoo, Arch, and many others. Various email clients, the environment console and system packages also make the system extremely fragmented and difficult for any virus. The architecture of Windows is not so divided, so a virus could easily reach the many computers of the system which will cause harm to their users.
5. Recording system events Linux
Linux accesses to files and system accesses are written to a log file. If someone tries to enter safe system files, these system gaps can be viewed by the system administrator. Also are written to the disk failed login attempts and other security issues, and all this is available to study later.
6. Less users
The number of users using Linux is much less in comparison with Windows and Mac OS. As the number of users is smaller, less viruses will strive to hit their computers to gain access to important data.
The question is not which operating system will best meet your security requirements. It is clear that Linux is not only immune to security problems - his virus scanners and firewalls make this operating system the best choice, for example, for a business than any other OS.