Explain how unix permissions can be regarded as access


Assignment

Submit your responses to the following questions in APA6 report format. Please keep in mind the point weight for the questions - one-line, short paragraph and non-relevant answers will not get ANY points.

1) Access Control

a) Describe what an access control list is.

b) Explain how UNIX permissions can be regarded as access control lists.

c) Describe capability-based access control.

d) Contrast access control lists and capability-based access control.

2) Cloud security- Describe the mechanisms and protocols used by the Trusted Third Party method of cloud security to provide confidentiality, integrity, and authenticity.

Article: Addressing cloud computing security issues by Dimitrios Zissis and Dimitrios Lekkas.

3) IS Management- Describe the conclusions reached by Soomro, et al with respect to information security management. What relationship should the technical, management, and human dimensions have? Whose responsibility is information security in an organization?

4) Design Principles- In their seminal 1975 paper, Saltzer and Schroeder articulated eight principles for "The Protection of Information in Computer Systems". These principles are:

A. Least Privilege

B. Fail-safe Defaults

C. Economy of Mechanism

D. Complete Mediation

E. Open Design

F. Separation of Privilege

G. Least Common Mechanism

H. Psychological Acceptability

Give a short description of each of the principles. Do not copy or rephrase the statements in the paper - there need to be explanations in your own words, with examples provided to demonstrate your understanding.

Article: The Protection of Information in Computer Systems by JEROME H. SALTZER and MICHAEL D. SCHROEDER.

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Explain how unix permissions can be regarded as access
Reference No:- TGS02739416

Expected delivery within 24 Hours