LA B | Configure Windows File System Permissions
LAB – ASSESSMENT WORKSHEET
Configure Windows File System Permissions
Course Name and Number:
IS3230 Access Security
Student Name:
Steve Guzman
Instructor Name:
Ms. Matykowski
Lab Due Date:
Overview
In this lab, you reviewed a scenario requiring you to design a Windows folder structure, and you implemented your design. Next, you used the Microsoft® Active Directory Users and Computers utility to create security groups that suited the requirements in the scenario. Finally, you applied those security groups to the folder structure you designed.
Lab Assessment Questions & Answers
1. When you designed a file system in the first section of this lab, why did you choose the structure that you
selected?
To keep an organizational structure of the classes being offered.
2. As you look back on the file structure that you created, what changes would you want to make if you
were to use it for a real college environment?
I would probably add a couple of folders under each course folder labeled "Completed Students
Assignments", other than that the structure is simple enough to maintain and keep organized.
38399_LMxx_Lab03.indd 52
9/10/12 1:08 PM
Assessment Worksheet
53
3. In this lab, you assigned members of the Faculty group full control of the Assignments folder. What risk
does this pose?
They can make unwarranted changes the folders, throwing off the structure of the folders or files.
4. What could you do to correct the situation described in question 3?
Assigning permissions to correct users based on what access they need.
5. What Windows file security attribute allows a user to move through a folder to access files and folders
beneath it?
Traverse Folder
Read Attributess
38399_LMxx_Lab03.indd 53
Configure Windows File
System Permissions
6. What Windows file security attribute allows a user to view a file’s contents?
9/10/12 1:08 PM
38399_LMxx_Lab03.indd 54
9/10/12 1:08 PM
You May Also Find These Documents Helpful
-
3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?…
- 766 Words
- 4 Pages
Good Essays -
8. In terms of permissions, what does 777 mean? Everyone can read write and execute…
- 989 Words
- 4 Pages
Powerful Essays -
This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.…
- 308 Words
- 2 Pages
Good Essays -
Lab Part 1: Configure Access Rights to Folder & Files Using Microsoft GPO Manager & Enable Microsoft BSA to Define a Security Baseline Definition…
- 952 Words
- 4 Pages
Satisfactory Essays -
Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…
- 689 Words
- 3 Pages
Good Essays -
If you want to organize your information into "file cabinets" which you can access easily, quickly view, and work from what is contained within, see Section A.…
- 261 Words
- 2 Pages
Satisfactory Essays -
In order to understand how to control access to a file in a system that supports 5,000 users to 4,990 of those users, a basic understanding of the file permissions of a file on a UNIX system is necessary. A user has the ability to perform three basic actions to a file, read, write and execute. These three actions will be represented by r, w, and x respectively. A UNIX system uses a combination of these characters to control the file permissions. The first three characters represent the owner’s permissions, the middle three characters represent the group’s permissions, and the last three characters represent others permission. A sample of file permission would look like the following:…
- 566 Words
- 3 Pages
Good Essays -
Allows the user to read only on specific files not allowing them to change the file.…
- 426 Words
- 3 Pages
Satisfactory Essays -
Problems with the traditional file environment include data redundancy and confusion, program-data dependence, lack of flexibility, poor security, and lack of data sharing and availability. Data redundancy is the presence of duplicate data in multiple data files. In this situation, confusion results because the data can have different meanings in different files. Program-data dependence is the tight relationship between data stored in files and the specific programs required to…
- 3300 Words
- 14 Pages
Powerful Essays -
– Describe the physical and logical attributes of aggregates and flexible and traditional volumes – Use the command line and FilerView to create and manage aggregates, flexible volumes and traditional volumes. – Describe space considerations associated with flexible volume creation and resizing options – List the conditions required for the removal of aggregates and flexible and traditional volumes – Describe the performance characteristics and benefits of using Aggregates and Flexible volumes – Analyze and execute the available tools to fix inconsistent file systems with aggregates and flexible volumes – Describe and execute new maintenance mode commands on aggregates and flexible volumes…
- 11355 Words
- 46 Pages
Powerful Essays -
A customised file system provides hierarchical storage and organization of files mostly on a single computer and it is usually part of the operating system of the computer the files are stored.…
- 536 Words
- 3 Pages
Good Essays -
* Arranging similarly structured records in secondary memory (primary hard disks) so that individual and groups of records (called file organizations) can be stored, retrieved and updated rapidly. Consideration may also be given to protect data and recovering data after errors are found.…
- 7944 Words
- 32 Pages
Good Essays -
As for file permission, all files and directories pertaining to a UNIX system are marked with three sets of file permissions. These permissions are used to establish the way these files can be accessed and the…
- 8388 Words
- 34 Pages
Good Essays -
File management in any computer system is a very crucial function. Proper file management alleviates everyday issues in file protection, to allow a smooth experience for users. Using file protection for operating systems, such as Unix, can be very easy and simple. Unix is a multiuser operating system that is used on a wide range of machines from powerful microcomputers to supercomputers (Stallings, 2012). In Unix, permissions are configured to allow owner(s) to define different permissions of files by restricting or permitting access where needed. These permissions are set to categories of owner, group, and other permissions. In early versions of file control and access for Unix, users where assigned a user identification number. These users also were members of groups and a group identification number identified each group. Now when a file is created by a user, not only is the file owned by a specific owner, but by the owners primary group as well. Attached to files are protection bits, where read, write, and execute permissions are specified and carried down to other users of the group/groups the owner belongs to. Anyone can see the issue that lies in this type of file access control. What happens when the owner desires only specific users or no users at all to have access to the created file?…
- 572 Words
- 2 Pages
Good Essays -
Each file is assigned a set of 12 protection bits. Nine of the protection bits assigned to a file are used to specify read, write, and execute permission for the owner, members of the group, and all other users. The other three bits are used to specify the file’s other behaviors. Two of the remaining bits are the SetUID and SetGID, and the final bit is known as the “Sticky” bit. The Sticky bit is no longer used, but was used to tell the system to keep a file in many after it is executed.…
- 491 Words
- 2 Pages
Good Essays