Reference no: EM13815831
Based on UNIX systems security model, the Linux security model is as rigid as the UNIX security model--and sometimes even more robust. In Linux, every file is owned by a user and a group user. Those users that are not the user owner and don't belong to the group owning the file are in a third category or users. For each of the three categories of users, the following permissions can be granted or denied:
You have already used the long option to list files using the ls -l command; this command also displays file permissions for these three user categories. They are indicated by the nine characters that follow the first character (the file type indicator at the beginning of the file properties line). Permissions are always presented in the same order: read, write, execute for the user, the group, and the others.
With Windows, there is always uncertainty. Files permissions are one of the most confusing issues for Windows defectors. Home-user Windows systems do not have any concept of file ownership...which can be a good or bad thing. Remember that Linux is a UNIX system at heart, and UNIX supports multiple users. Even on home computers, permissions allow you to block sensitive files from being edited or read by unauthorized people.
Consider your old Windows box. Maybe you spent hours or days getting your preferences and settings just right, only to find that the next time you sit down at the computer, someone has changed the colors to purple and neon green and changed the system time to GMT when you live in EST. Then imagine you spend all weekend finalize your big report for your supervisor...only to find out that your child has just discovered the joy of "delete," and now it is lost forever.
In your discussion post:
- Compare the Linux file permissions and the Windows NTFS permission model (security to the file level).
- Explain which system offers the best security model for file level security. Support your opinion and defend your position using credible sources. Cite your sources in APA format.
Please be aware that part of your grade for all Discussion Forums is based on whether you use/cite Sourcesin answering the original question. (This is worth 10% of your Discussion grade.) Please do some online research for this topic and list references to websites you use in learning about these topics. (Please see the Discussion Participation Policies in the Online Policies and Procedures resources block in Moodle for more info.) Also, please cite your sources and be careful to not plagiarize your answer. (See the News Post I made during Week 1 about how to avoid plagiarism.) (All text taken from sources must be in "quotes".)
If you do not know anything about the topics being discussed, conduct some research and come back to the board. Remember to provide proper APA citation for any resources you use and make sure to include the source links. Remember to proofread and spell check your discussion contributions before posting.
References
Garrels, M. (2007). Introduction to Linux. Retrieved from https://tldp.org/LDP/intro-linux/html/sect_03_04.htm
Attendance at minor league baseball games
: Given that attendance at minor league baseball games are substitutes for attendance at MLB games. Explain why a fall in minor league ticket prices may adversely affect MLB game attendance.
|
Original cost of the land is used in the analysis
: US Airways owns a piece of land near the Pittsburgh International Airport. The land originally cost US Airways $375,000. The airline is considering building a new training center on this land. US Airways determined that the proposal to build the new ..
|
Practice building effective measurement questions
: The purpose of this assignment is to practice building effective measurement questions. You will build these types of questions in Module 05 that will become part of your final course project, so this is a good time to find out how it is done.
|
Relationship between patient satisfaction and inpatient
: Write a paper of 1,000-1,250 words regarding the statistical significance of outcomes as presented in Messina's, et al. article "The Relationship between Patient Satisfaction and Inpatient Admissions across Teaching and Nonteaching Hospitals."
|
Based on unix systems security model
: Based on UNIX systems security model, the Linux security model is as rigid as the UNIX security model--and sometimes even more robust. In Linux, every file is owned by a user and a group user. Those users that are not the user owner and don't belong ..
|
Determine dollar sales volume required to earn target profit
: McKee Corporation has annual fixed costs of $12 million. Its variable cost ratio is 0.60. Determine the company’s break-even dollar sales volume. Determine the dollar sales volume required to earn a target profit of $3 million.
|
What is the maximum amount by which the money supply
: Yesterday Bank A had no excuses reserves. Today it received a new deposit of $4,000. if the bank maintains a reserve requirement of 2 percent, what is the maximum loam that Bank A can make? What is the maximum amount by which the money supply can be ..
|
Demand schedule-demand curve-supply schedule
: Explain the following concepts: demand schedule, demand curve, supply schedule, supply curve. Then, list the determinants of demand and explain how a change in each determinant affects the demand curve. Do the same for the supply.
|
Using the normal distribution
: Using the normal distribution, find the probability that a population with a mean of 35 and a standard deviation of 8 will produce a sample mean of less 34 in a sample of size 64.
|