In Section 3.7.2, a set of problems examine a scenario in which Riko is writing a program for Bob. The program is to be protected according to the security policy given in Table 3.8. Answer the following questions based on that scenario. a. Use Unix permission flags to provide security controls for Riko’s file. Make the list of permissions in the format of Table 4.3. b. Make a list of the advantages in solving this problem with Unix permission flags versus using Windows “professional” ACLs. Which would you prefer? Why? c. Make a list of the advantages in solving this problem with Windows professional ACLs versus using Windows home edition ACLs. Which would you prefer? Why?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here