Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

This requires Linux and Windows. I'm new with those two things. Short descriptions would help me. Consider the key differences between a mandatory protection system

This requires Linux and Windows. I'm new with those two things. Short descriptions would help me.

image text in transcribed

Consider the key differences between a mandatory protection system and a discretionary protection system For Linux, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a Linux shell script that runs these commands, and prints out a "yes" or no" answer to the question of whether it is a discretionary protection system. Submit this shell script as "Lastname_firstname_Linux.sh". In your assignment document, outline the steps taken in point form and briefly explain why they prove the protection system is discretionary b. In Windows, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a batch file that that runs these commands, and prints out a "yes" or "no" answer to the question of whether it is a discretionary protection system. Submit this batch file as "Lastname_firstname_Windows.cmd". In your assignment document, outline the steps taken in point form and why they prove the protection system is discretionary. Write a Linux shell script that finds all files on the entire system that contain a given text C. string (supplied at the script's command line), and changes the permissions of each such file such that only root has read and write permissions. Note that your script should handle any error conditions by printing out a descriptive error message to the shell before exiting. Submit your script with the filename "Lastname firstname restrictfiles.sh" Consider the key differences between a mandatory protection system and a discretionary protection system For Linux, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a Linux shell script that runs these commands, and prints out a "yes" or no" answer to the question of whether it is a discretionary protection system. Submit this shell script as "Lastname_firstname_Linux.sh". In your assignment document, outline the steps taken in point form and briefly explain why they prove the protection system is discretionary b. In Windows, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a batch file that that runs these commands, and prints out a "yes" or "no" answer to the question of whether it is a discretionary protection system. Submit this batch file as "Lastname_firstname_Windows.cmd". In your assignment document, outline the steps taken in point form and why they prove the protection system is discretionary. Write a Linux shell script that finds all files on the entire system that contain a given text C. string (supplied at the script's command line), and changes the permissions of each such file such that only root has read and write permissions. Note that your script should handle any error conditions by printing out a descriptive error message to the shell before exiting. Submit your script with the filename "Lastname firstname restrictfiles.sh

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Formal SQL Tuning For Oracle Databases Practical Efficiency Efficient Practice

Authors: Leonid Nossov ,Hanno Ernst ,Victor Chupis

1st Edition

3662570564, 978-3662570562

More Books

Students also viewed these Databases questions

Question

5. Structure your speech to make it easy to listen to

Answered: 1 week ago

Question

1. Describe the goals of informative speaking

Answered: 1 week ago