ISSC361 APUS Information Security Controlling, Sharing & Storing Files

User Generated

QnqqlFunex

Writing

American Public University System

Description

All posts must be a minimum of 250-300 words.

For this assignment, create a new message and address the following items in your response.

  1. Give reasons why a user would protect a file from read or write access by other users and provide examples how this can be done.
  2. Explain the difference between a virus, a worm, and a Trojan.
  3. Explain why it is safer for administrators to use two different accounts when working with a computer. Explain the difference between the two accounts.
  4. Explain how access restrictions on a folder or directory can block a user’s access to a file, even if the file itself may be readable by that user.
  5. Explain the four general tasks that may play a role in recovering from a security incident

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, kindly find attached

Running head: ISSC361 CONTROLLING, SHARING AND STORING

ISSC361 Controlling, sharing and storing
Student’s Name
Institution
Date:

1

ISSC361 CONTROLLING, SHARING AND STORING

2

1. Give reasons why a user would protect a file from read or write access by other users
and provide examples of how this can be done.
Users protect files from reading as well as write to prevent intruders from changing or stealing
the user's sensitive information. Also, users protect their read and write data to deter intruders from
sharing their confidential information to the third parties (Lampson, 1974). For example, the user
can protect his/her by encrypting his/her file, to make the data unreadable to other people or the
user can hide the files hoping that an unauthorized person will not be able to access the sensitive
information....

Similar Content

Related Tags