Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Software Security Examine a scenario in which Riko is writing a program for Bob.

ID: 3664640 • Letter: S

Question

Software Security

Examine a scenario in which Riko is writing a program for Bob. The program is to be protected according to the security policy given in Table 3.8. Answer the following question based on that scenario.

1. Use Unix permission flags to provide security controls for Riko’s file. Make the list of permissions in the format of Table 4.3.

Pol Policy Statement Risks Everyone shall have execute access to the compiler program. Riko shall have full access to the program's source code. Riko shall have full access to the program's executable file 1,2 2, 4,5 2, 5 2 Rko shall hvefull es o he program's source code. 4 Bob shall have read and execute access to the program's executable file.1, 2, 4.!5 Table 3.8: Policy for protecting Riko's custom program

Explanation / Answer

owning Group

(Members)

control number file owner

owning Group

(Members)

Owner group World Statements 15 Rikos File Riko Riko --X --X --X 1 16 Rikos File Riko Riko RWX RWX RWX 2 17 Rikos File Riko Riko RWX RWX RWX 3 18 Rikos File Riko Riko,Bob --X --X -X 4
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote