Nbspbased on unix systems security model the linux security


Based on UNIX systems security model, the Linux security model is as rigid as the UNIX security model--and sometimes even more robust. In Linux, every file is owned by a user and a group user. Those users that are not the user owner and don't belong to the group owning the file are in a third category or users. For each of the three categories of users, the following permissions can be granted or denied:

  • Read
  • Write
  • Execute

You have already used the long option to list files using the ls -l command; this command also displays file permissions for these three user categories. They are indicated by the nine characters that follow the first character (the file type indicator at the beginning of the file properties line). Permissions are always presented in the same order: read, write, execute for the user, the group, and the others.

With Windows, there is always uncertainty. Files permissions are one of the most confusing issues for Windows defectors. Home-user Windows systems do not have any concept of file ownership...which can be a good or bad thing. Remember that Linux is a UNIX system at heart, and UNIX supports multiple users. Even on home computers, permissions allow you to block sensitive files from being edited or read by unauthorized people.

Consider your old Windows box. Maybe you spent hours or days getting your preferences and settings just right, only to find that the next time you sit down at the computer, someone has changed the colors to purple and neon green and changed the system time to GMT when you live in EST. Then imagine you spend all weekend finalize your big report for your supervisor...only to find out that your child has just discovered the joy of "delete," and now it is lost forever.

In your discussion post:

  • Compare the Linux file permissions and the Windows NTFS permission model (security to the file level).
  • Explain which system offers the best security model for file level security. Support your opinion and defend your position using credible sources. Cite your sources in APA format. 

Please be aware that part of your grade for all Discussion Forums is based on whether you use/cite Sourcesin answering the original question. (This is worth 10% of your Discussion grade.) Please do some online research for this topic and list references to websites you use in learning about these topics. (Please see the Discussion Participation Policies in the Online Policies and Procedures resources block in Moodle for more info.) Also, please cite your sources and be careful to not plagiarize your answer. (See the News Post I made during Week 1 about how to avoid plagiarism.) (All text taken from sources must be in "quotes".)

If you do not know anything about the topics being discussed, conduct some research and come back to the board. Remember to provide proper APA citation for any resources you use and make sure to include the source links. Remember to proofread and spell check your discussion contributions before posting.

 

 

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Nbspbased on unix systems security model the linux security
Reference No:- TGS01093940

Expected delivery within 24 Hours