Description
All posts must be a minimum of 250-300 words.
For this assignment, create a new message and address the following items in your response.
- Give reasons why a user would protect a file from read or write access by other users and provide examples how this can be done.
- Explain the difference between a virus, a worm, and a Trojan.
- Explain why it is safer for administrators to use two different accounts when working with a computer. Explain the difference between the two accounts.
- Explain how access restrictions on a folder or directory can block a user’s access to a file, even if the file itself may be readable by that user.
- Explain the four general tasks that may play a role in recovering from a security incident
Explanation & Answer
Hi, kindly find attached
Running head: ISSC361 CONTROLLING, SHARING AND STORING
ISSC361 Controlling, sharing and storing
Student’s Name
Institution
Date:
1
ISSC361 CONTROLLING, SHARING AND STORING
2
1. Give reasons why a user would protect a file from read or write access by other users
and provide examples of how this can be done.
Users protect files from reading as well as write to prevent intruders from changing or stealing
the user's sensitive information. Also, users protect their read and write data to deter intruders from
sharing their confidential information to the third parties (Lampson, 1974). For example, the user
can protect his/her by encrypting his/her file, to make the data unreadable to other people or the
user can hide the files hoping that an unauthorized person will not be able to access the sensitive
information....