Software Security Examine a scenario in which Riko is writing a program for Bob.
ID: 3664640 • Letter: S
Question
Software Security
Examine a scenario in which Riko is writing a program for Bob. The program is to be protected according to the security policy given in Table 3.8. Answer the following question based on that scenario.
1. Use Unix permission flags to provide security controls for Riko’s file. Make the list of permissions in the format of Table 4.3.
Pol Policy Statement Risks Everyone shall have execute access to the compiler program. Riko shall have full access to the program's source code. Riko shall have full access to the program's executable file 1,2 2, 4,5 2, 5 2 Rko shall hvefull es o he program's source code. 4 Bob shall have read and execute access to the program's executable file.1, 2, 4.!5 Table 3.8: Policy for protecting Riko's custom programExplanation / Answer
owning Group
(Members)
control number file ownerowning Group
(Members)
Owner group World Statements 15 Rikos File Riko Riko --X --X --X 1 16 Rikos File Riko Riko RWX RWX RWX 2 17 Rikos File Riko Riko RWX RWX RWX 3 18 Rikos File Riko Riko,Bob --X --X -X 4Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.