Answered step by step
Verified Expert Solution
Question
1 Approved Answer
This requires Linux and Windows. I'm new with those two things. Short descriptions would help me. Consider the key differences between a mandatory protection system
This requires Linux and Windows. I'm new with those two things. Short descriptions would help me.
Consider the key differences between a mandatory protection system and a discretionary protection system For Linux, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a Linux shell script that runs these commands, and prints out a "yes" or no" answer to the question of whether it is a discretionary protection system. Submit this shell script as "Lastname_firstname_Linux.sh". In your assignment document, outline the steps taken in point form and briefly explain why they prove the protection system is discretionary b. In Windows, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a batch file that that runs these commands, and prints out a "yes" or "no" answer to the question of whether it is a discretionary protection system. Submit this batch file as "Lastname_firstname_Windows.cmd". In your assignment document, outline the steps taken in point form and why they prove the protection system is discretionary. Write a Linux shell script that finds all files on the entire system that contain a given text C. string (supplied at the script's command line), and changes the permissions of each such file such that only root has read and write permissions. Note that your script should handle any error conditions by printing out a descriptive error message to the shell before exiting. Submit your script with the filename "Lastname firstname restrictfiles.sh" Consider the key differences between a mandatory protection system and a discretionary protection system For Linux, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a Linux shell script that runs these commands, and prints out a "yes" or no" answer to the question of whether it is a discretionary protection system. Submit this shell script as "Lastname_firstname_Linux.sh". In your assignment document, outline the steps taken in point form and briefly explain why they prove the protection system is discretionary b. In Windows, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a batch file that that runs these commands, and prints out a "yes" or "no" answer to the question of whether it is a discretionary protection system. Submit this batch file as "Lastname_firstname_Windows.cmd". In your assignment document, outline the steps taken in point form and why they prove the protection system is discretionary. Write a Linux shell script that finds all files on the entire system that contain a given text C. string (supplied at the script's command line), and changes the permissions of each such file such that only root has read and write permissions. Note that your script should handle any error conditions by printing out a descriptive error message to the shell before exiting. Submit your script with the filename "Lastname firstname restrictfiles.shStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started