Chat with us, powered by LiveChat

Explain which approach offers the best security model for file-level security, and include a discussion of the use-cases.

Words: 130
Pages: 1
Subject: Uncategorized
  • Both Linux, like UNIX and Microsoft Windows operating system, is POSIX compliant EAL-4+ certified. Both have every file owned by a user and a group user. Most of the time in Linux, read, write and execute access is controlled solely on if you are the owner, a member of the owner group, or neither (aka others or the world). In contrast, most of the time on Microsoft Windows, extensive use is made of per files Access Control List to grant fine-grain control to files.
    • Explain which approach offers the best security model for file-level security, and include a discussion of the use-cases.
    • Support your opinion and defend your position using credible sources in APA format.
  • What disadvantages do you perceive with File Modules to automate Linux common management tasks?