Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Based on UNIX systems security model, the Linux security model is as rigid as the UNIX security model--and sometimes even more robust. In Linux, every file is owned by a user and a group user. Those users that are not the user owner and don't belong to the group owning the file are in a third category or users. For each of the three categories of users, the following permissions can be granted or denied:

  • Read
  • Write
  • Execute

You have already used the long option to list files using the ls -l command; this command also displays file permissions for these three user categories. They are indicated by the nine characters that follow the first character (the file type indicator at the beginning of the file properties line). Permissions are always presented in the same order: read, write, execute for the user, the group, and the others.

With Windows, there is always uncertainty. Files permissions are one of the most confusing issues for Windows defectors. Home-user Windows systems do not have any concept of file ownership...which can be a good or bad thing. Remember that Linux is a UNIX system at heart, and UNIX supports multiple users. Even on home computers, permissions allow you to block sensitive files from being edited or read by unauthorized people.

Consider your old Windows box. Maybe you spent hours or days getting your preferences and settings just right, only to find that the next time you sit down at the computer, someone has changed the colors to purple and neon green and changed the system time to GMT when you live in EST. Then imagine you spend all weekend finalize your big report for your supervisor...only to find out that your child has just discovered the joy of "delete," and now it is lost forever.

In your discussion post:

  • Compare the Linux file permissions and the Windows NTFS permission model (security to the file level).
  • Explain which system offers the best security model for file level security. Support your opinion and defend your position using credible sources. Cite your sources in APA format. 

Please be aware that part of your grade for all Discussion Forums is based on whether you use/cite Sourcesin answering the original question. (This is worth 10% of your Discussion grade.) Please do some online research for this topic and list references to websites you use in learning about these topics. (Please see the Discussion Participation Policies in the Online Policies and Procedures resources block in Moodle for more info.) Also, please cite your sources and be careful to not plagiarize your answer. (See the News Post I made during Week 1 about how to avoid plagiarism.) (All text taken from sources must be in "quotes".)

If you do not know anything about the topics being discussed, conduct some research and come back to the board. Remember to provide proper APA citation for any resources you use and make sure to include the source links. Remember to proofread and spell check your discussion contributions before posting.

 

 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91383670
  • Price:- $20

Guranteed 24 Hours Delivery, In Price:- $20

Have any Question?


Related Questions in Computer Engineering

What is the purpose of load balancing i need full

What is the purpose of load balancing? (I need full explanation) I already know what load balancing is, I just need to know why we use it

Excel discussionconsider this using the mouse to point and

Excel discussion Consider this.... Using the mouse to point and click is one way to work on a computer. Often, the same work can be accomplished using just the keyboard, using shortcut keyboard combinations. For example, ...

If material hardness is normally distributed with a mean of

If material hardness is normally distributed with a mean of 42 and a standard deviation of 1. Specification limits for hardness are from 35 to 45. When the fraction defective is 0.0017 what is the corresponding PPM?

Question explain why you should always search the free

Question: Explain why you should always search the free space and slack space if you suspect person who deliberately delete file or information on a workstation that you are analyzing. The response must be typed, single ...

Question list and describe two forms of organizational

Question: List and describe two forms of organizational change. How does organizational change create business innovation? Give an example. Reply substantively to two other learners with thought provoking statements and ...

String firstnamearraychar gradearrayassuming that this text

String firstName[ARRAY]; char grade[ARRAY]; Assuming that this text file is already inputted into the program. Write a loop that will display the students that have "A" or "B" next to their names. If the stuent has a "A" ...

Explain data information and knowledge with examples make

Explain data, information, and knowledge with examples. Make sure to clearly identify the differences between the terms.

Search the internet for information regarding the

Search the Internet for information regarding the interaction between web browser and web server using HTTPS from initial handshake to close of the session. Create a detailed drawing of the steps and also annotate each s ...

Suppose you are given a connected graph g with edge costs

Suppose you are given a connected graph G, with edge costs that are all distinct. Prove that G has a unique minimum spanning tree.

Scheduling algorithms are again becoming more important as

Scheduling algorithms are again becoming more important as we look at operating system that run on mobile devices. Are their scheduling algorithms different from those found on traditional interactive system? Compare and ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As