Preview

Compare Access Control Techniques Between Linux And Windows Case Study

Good Essays
Open Document
Open Document
1163 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Compare Access Control Techniques Between Linux And Windows Case Study
Question #01: Compare access control techniques between Linux and Windows. Which one provides better control and in which conditions?
Ans: Access Control techniques in windows are as: Window contains of two types of ACLs Discretionary ACL and a System ACL. Windows files have an owner mean that the creator of the file. In window owner is not a group which they belong. An access right in window doesn’t give importance to owner. File in the window have two main categories either it require the explicit list of people and groups or get it from the parent directory. File list consist of users and groups who have the specific right access to the directory, file or subdirectories.
In window for file configuration you not need the owner. Instead of the owner set a ACL.
…show more content…
The servers providing the services are terminated if the server is shutdown. Due to this critical rights user are restricted to shutting down a server. There are also mandatory for a limited number of people a after new installations a server demands a restart so a person with shutdown privilege is important.

Question#04: What is the structure of ACE in ACL of windows server2008? What information is stored in its various flags?

Ans: Ans: The Structure of ACE in ACL are:
Object-specific ACE is used in the ACL for Active Directory objects. Due to the Object-specific ACE it is possible to describe the independent control property of the Active Directory object.ACL consist of ACE. Define a set of particular access rights for the user. ACE consist of information of identification and access right of allow-read, allow-write, deny-write. It also used for collecting the information of the inheritance flags and audit the flags.
SYSTEM_AUDIT_OBJECT_ACE structure defines ACE. There are three types of function ACE perform that are:
1) Access allowed ACE.
2) Access denied ACE.
3) System audit ACE.
Orders of ACE in ACL are shown the below

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    This could happen for multiple reasons, the user could either have conflicting permissions or there could be multiple users manipulating the file. The user may have modify permissions in NTFS but the share folder permissions may be stricter, read-only; the most restrictive permissions takes precedence. For the user to be able to modify the file, the permissions should be loosened. The problem may also be that another user modified the file while our user had the file open, this would prevent the file to be modified. The user can save another copy of the file and re-write the original file…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?…

    • 766 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Good Essays

    1) Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data.…

    • 518 Words
    • 2 Pages
    Good Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources?…

    • 503 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    8. Access control: Focuses on business requirement for access control, user access management, user responsibilities, network access control, operating system access control, application and information access control, and mobile computing and teleworking…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    An ACL is a Control list which will allow or deny traffic or devices based on specifications defined in the ACL. This ACL generally is applied and configured on Firewalls. It is useful in a layered security approach because from an External standpoint it become the first line of defense when hosts attempt to connect to the network.…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lesson 2

    • 959 Words
    • 4 Pages

    6. The combination of permissions assigned to a file, plus the permissions inherited from parent folders and group memberships, is called the file’s effective permissions.…

    • 959 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    1. The differences between Lincoln and Douglas on what right blacks Americans are entitled to enjoy: Abraham Lincoln was a Whig leader in the early nineteen century (1847-1849). In his view, he believed that blacks should have the same right as white. People were born with their own natural right, so Lincoln assumed that blacks could enjoy their liberty and freedom. On the other hand, Douglas stood on the view that “this government was first established it was the policy of its founders to prohibit the spread of slavery into the new territories of the United States”. Therefore, he believed that slavery could still exist in some states in America.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A wide array of interactions among plants, animals, and microorganisms occurs in nature. Some of these relationships are characterized by a close physical association among species that continues for a large period of the life cycle. In 1879 German botanist Heinrich Anton de Bary coined the term "symbiosis" to describe these relationships, meaning the living together of different species of organisms. Many people associate symbiosis with mutualism, interactions that are beneficial to the growth, survival, and/or reproduction of both interacting species. But symbiotic interactions also include commensalism (one species receives benefit from the association and the other is unaffected), amensalism (one species is harmed, with no effect on the other), and parasitism. An example of commensalism is found in the anemone fish, which gains protection from living among the poisonous tentacles of the sea anemone, but offers no known benefit to its host.…

    • 1005 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Frankenstein

    • 1524 Words
    • 7 Pages

    The book Frankenstein, by Mary Shelley, is the story of Dr. Victor Frankenstein. Robert Walton, captain of a ship exploring the “Land of mist and snow”, rescues Dr. Frankenstein. As Frankenstein lies ill aboard the ship he tells his story to the captain, who shares the encounter in letters written to his sister. The story takes place in Europe during the 1800’s. Frankenstein is sent to the University of Ingolstadt, where he studies natural philosophy and chemistry.…

    • 1524 Words
    • 7 Pages
    Powerful Essays