Based on unix systems security model

Assignment Help Basic Computer Science
Reference no: EM13813739

Based on UNIX systems security model, the Linux security model is as rigid as the UNIX security model--and sometimes even more robust. In Linux, every file is owned by a user and a group user. Those users that are not the user owner and don't belong to the group owning the file are in a third category or users. For each of the three categories of users, the following permissions can be granted or denied:

  • Read
  • Write
  • Execute

You have already used the long option to list files using the ls -l command; this command also displays file permissions for these three user categories. They are indicated by the nine characters that follow the first character (the file type indicator at the beginning of the file properties line). Permissions are always presented in the same order: read, write, execute for the user, the group, and the others.

With Windows, there is always uncertainty. Files permissions are one of the most confusing issues for Windows defectors. Home-user Windows systems do not have any concept of file ownership...which can be a good or bad thing. Remember that Linux is a UNIX system at heart, and UNIX supports multiple users. Even on home computers, permissions allow you to block sensitive files from being edited or read by unauthorized people.

Consider your old Windows box. Maybe you spent hours or days getting your preferences and settings just right, only to find that the next time you sit down at the computer, someone has changed the colors to purple and neon green and changed the system time to GMT when you live in EST. Then imagine you spend all weekend finalize your big report for your supervisor...only to find out that your child has just discovered the joy of "delete," and now it is lost forever.

In your discussion post:

  • Compare the Linux file permissions and the Windows NTFS permission model (security to the file level).
  • Explain which system offers the best security model for file level security. Support your opinion and defend your position using credible sources. Cite your sources in APA format. 

Please be aware that part of your grade for all Discussion Forums is based on whether you use/cite Sourcesin answering the original question. (This is worth 10% of your Discussion grade.) Please do some online research for this topic and list references to websites you use in learning about these topics. (Please see the Discussion Participation Policies in the Online Policies and Procedures resources block in Moodle for more info.) Also, please cite your sources and be careful to not plagiarize your answer. (See the News Post I made during Week 1 about how to avoid plagiarism.) (All text taken from sources must be in "quotes".)

If you do not know anything about the topics being discussed, conduct some research and come back to the board. Remember to provide proper APA citation for any resources you use and make sure to include the source links. Remember to proofread and spell check your discussion contributions before posting.

 

 

Reference no: EM13813739

Questions Cloud

Create a professional development plan : Create a professional development plan to address the characteristics of the Learning Team members both individually and as a group and your ability to lead them:
Explain at least three causes of the great depression : Explain at least three causes of the Great Depression and the specific, corresponding New Deal programs meant to respond to those causes.
Theories of security management : 1. Evaluate the effectiveness of the physical and environmental security measures that the organization you researched used in regard to protecting its assets. Indicate improvements to the organization's security measures where applicable. Justify yo..
Does tara have a claim under the civil rights act : ara's boss has just advised her that she will not be promoted to client service manager because her Irish accent is not appreciated by the clients of British Industries. Does Tara have a claim under the Civil Rights Act? What is the process for fi..
Based on unix systems security model : Based on UNIX systems security model, the Linux security model is as rigid as the UNIX security model--and sometimes even more robust. In Linux, every file is owned by a user and a group user. Those users that are not the user owner and don't belong ..
Have you discovered any habits or tips that help you : What struck you in particular as you explored the course materials? Have you discovered any habits or tips that help you to complete your course work more effectively or efficiently?
The international standard for security : 1) The international standard for security (ISO 17799) documents a set of best practices for information systems security. List and briefly summarize the 10 major sections of the standard.
Provide stronger security : Widgets Incorporated's computer network was recently attacked. The Chief Information Officer (CIO) wants IT to implement a log management system to allow them to monitor suspicious activities. You have been hired to implement a security plan. Discuss..
Plan and conduct an inquiry : Plan and Conduct an Inquiry PurposeYour task is to plan and conduct a lab activity into how ONE of the following factors affect the rate of a chemical reaction: change in temperature (ex. hot vs. cold water), increased surface area (i.e. particle si..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explaining health insurance portability-accountability act

Based on your knowledge of IT security management, argue for or against assertions that Epworth system is in compliance with Health Insurance Portability and Accountability Act (HIPAA).

  Hash function uniformly distributes n keys over the tables

If a hash table contains tablesize positions and n records currently occupy the table, the load factor lf is defined as n/tablesize. Suppose a hash function uniformly distributes n keys over the tablesize positions of the table and lf is the load fac..

  Print the list after each value is inserted into the list

Generate 10 random numbers between in the range of 25 to 50. Insert them into a list, keeping the list in order as each value is inserted. Print the list after each value is inserted into the list.

  Create a powerpoint presentation on a person that admire you

Select a person that you admire the most. The person can be a family member, friend, musician, etc. Create a four (4) slide PowerPoint presentation

  Calculates how many km had went a man

Write a program that calculates how many km had went a man and how far he was from the initial point .

  Database-related except the history of databases

You can write about anything database-related except the history of databases. You must find something that relates to current and future issues in databases; the following Web site, www.sqlservercentral.com, is an excellent source for ideas.

  Social networking to make your organization more effective

How would you use social networking to make your organization more effective? If your organization currently uses a social networking tool, tell us which one and how you are using it. Even if your organization does not engage in social networking, is..

  What interface does an application need to use

What interface does an application need to use if it wants to get updates on the current position of the mouse cursor as the mouse is being moved? How does the program get the x,y coordinates of the mouse cursor?

  Tandem centre spool configuration is used in hydraulic

Name a few typical applications in which Tandem centre spool configuration is used in hydraulic system.

  How face-to-face project meetings provide greater value

Identify three techniques that can be used to make project meetings more effective. How do face-to-face project meetings provide greater value than phone conferences and virtual meetings?

  First argument of the function

Implement the given function above. The first argument of the function is a vector of "v" integers and the second argument is an integer "k". The function returns the number of times "k" occurs in "v".

  Draw a hierarchy diagram

Draw a hierarchy diagram (be sure to include Attributes and Methods)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd