Dual booting operating systems on campus owned computers is an unsupported option that poses security risks to the computer in question, the campus network and the future of your research.
These are some of the reasons:
1. Limited Security Updates:
Keeping two operating systems up-to-date with the latest security patches can be challenging. If one OS is rarely used, it might not receive regular updates, leaving it vulnerable to known exploits and attacks, putting campus at risk.
2. Increased Attack Surface:
Dual booting effectively doubles the attack surface of the computer. Each operating system has its own set of vulnerabilities and security weaknesses. This means that an attacker could potentially exploit vulnerabilities in either operating system to gain access to the computer.
3. Difficult Monitoring and Control:
Dual boot setups can complicate the task of monitoring and controlling security measures. Security tools and policies that are effective on one operating system might not be compatible or applicable to the other. This can lead to inconsistencies in security practices and gaps in protection.
4. Data Encryption Challenges:
Encrypting data becomes more complex when dealing with dual boot setups. Different operating systems might use different encryption mechanisms, which could lead to difficulties in ensuring consistent and robust data protection. Encryption is becoming a requirement for more research projects to comply with funding agency conditions.
5. Recovery and Backup Complications:
Creating backup and recovery strategies becomes more intricate with dual boot setups. Ensuring that both operating systems and their associated data are fully backed up and recoverable can be challenging.