Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Answer the questions below in order to determine the best solution for user-rela

ID: 2247088 • Letter: A

Question

Answer the questions below in order to determine the best solution for user-related data storage within your organization. Explain your recommendation. Be sure to cite your sources.

Are there different types of permissions for Linux and Windows systems?

How are permissions inherited when users are members of multiple user groups?

Windows has share and NTFS (Security tab) permissions. How do those interrelate?

When using Linux to access Windows resources, do the permissions still apply?

When using Windows to access Linux, do the permissions still apply?

What must be done in order to appropriately secure user data across all platforms?

If people pursue common good without harming individuals, we might not need to secure Linux or Windows systems. Provide your opinions as to valuing human value and dignity by securing operating systems.

Explanation / Answer

(a)

Yes, we have permissions ranging as below:

·        Read

·        Write

·        Execute

Any combination of above can be used. Furthermore, permissions can be categorized per user groups.

--------

(b)

The highest possible permission is inherited by the users.

--------

c)

Share is network based permission while NTFS permissions mentioned in the security tab are for the user groups.

--------

d)

If we are accessing the windows resources using a live linux disc or pen drive, then the resources in the hard disk are used by the user as per the permission given by the linux system. The window system is not even active at this moment.

However if using the windows subsystem (which is present in windows 10 64 bit), the access is dependent on how much windows provides to the linux layer installed inside of it.

--------

e)

Similar to above, it is dependent on windows.

--------

f)

We should encrypt the data in order to properly secure it across all platforms.

--------

g) Even if people do not harm individuals on purpose, there is always a case of accidental damage. So, it is best to secure the systems.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote