Unix/Linux: Every person has their unique ID called a UID, and each person is a part of at least one group. You can check the ID of the user by entering the command: id. There are two types of users in Unix: root and regular users. The regular user has limited control/privileges, whereas the root user, also known as the superuser, has full control over the OS.
Only three types of permissions are given to any user in Unix: read, write, and execute(r, w, x,). The user's information is stored in the /password file, whereas the password hashes are securely stored in the /shadow file.
Windows: It uses a Security Identifier (SID) for identifying users and their assigned groups, and only the administrator account has full control. Just like in Unix/Linux, Windows also has an administrator with full control, while regular users have limited privileges. Windows uses Access Control Lists (ACLs) to assign permissions to its users, providing detailed control rather than just read, write, or execute (r, w, x). Passwords are stored in the SAM (Security Accounts Manager) in an encrypted format.