Provide your response to the Essay Quiz questions in Chapter 11 1. A co-worker w
ID: 3593314 • Letter: P
Question
Provide your response to the Essay Quiz questions in Chapter 11
1. A co-worker with a strong Windows background is having difficulty understanding UNIX file permissions. Describe UNIX file permissions for him. Compare UNIX file permissions to Windows file permissions.
2. How are authentication and authorization alike and how are they different. What is the relationship, if any, between the two?
3. What is a VPN and what technologies are used to create one?
Please note that the requirement here is to write a 1 -2 (500 - 750 words) page paper. Be sure to include at least two reference sources. APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed.
Content Answered all questions correctly 5 points Did not answer one part/point correctly 4 points Did not answer two parts/points parts/points parts/points0 correctly 3 points Did not answer three of the Missed most No Submission of the assignment 1 points Frequent errors 1 points correctly 2 points Writing Skills More than occasional errors 2 points More than occasional formatting errors 2 points Very few Excellent totally free of errors errors 5 points Occasional errors 3 points No Submission 0 points 4 points Very few errors 4 points Occasional formatting errors 3 points Formatting Excellent Skills Frequent formatting errors 1 points No Submission 0 points totally free of errors 5 points References Supplied Suppliedevery Supplieda few references required to support the assignment 3 points No Submission 0 points references were supplied to support the assignment 1 points 4 points 2 points reference that was required to support the assignment 5 pointsExplanation / Answer
1. File ownership is an important component of Unix that provides a secure method for storing files. Every file in the Unix has the following attributes:
a. Owner permissions - Determine what actions the owner can perform on the file.
b. Group permissions - determines what action a group member can perform.
c. Other permissions - what action all other users can perform.
There are three access modes for a file they are read, write and execute.
1. Has three owner groups as described.
2. Offers application-level control.
3. Very effective permission structure for web and application servers.
Every file can have permissions assigned to it, for any number of the user, any number of groups or everyone.
Offers user level fine graded control.
Permissions are ideal for file storage and management.
2. Authentication and Authorization are completely orthogonal and independent but both are central to security design.
Authentication is the process of who you are(login+password)
Authorization, on the other hand, is the process to verify you have access to something(permissions- what you are allowed to do). Example - Mohit Khotani is authorized to create and delete databases, while Saksham is only authorized to read.
3. VPN or virtual private network is a method used to add security and privacy to the public and network, like Wifi hotspots and the internet and are most commonly used by organizations to protect sensitive data. VPN may allow employees to securely access a corporate intranet while located outside the office. To create a VPN in the windows the steps are :
i. Right-click on the network icon in the system tray and select open network and sharing center.
ii. Change adapter setting.
iii . File>New incoming connection.
iv. Add someone and then click Next.
v. Select through the internet and Next.
vi. Select the protocols that you want to enable for this connection most likely IPv4.
vii. Then click Close
references taken are Wikipedia.
Unix File permission Windows File permission1. Has three owner groups as described.
2. Offers application-level control.
3. Very effective permission structure for web and application servers.
Every file can have permissions assigned to it, for any number of the user, any number of groups or everyone.
Offers user level fine graded control.
Permissions are ideal for file storage and management.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.