User-Related data Storage within your Organization
Answer the questions below in order to determine the best solution for user-related data storage within your organization. Explain your recommendation. Be sure to cite your sources.
Are there different types of permissions for Linux and Windows systems?
How are permissions inherited when users are members of multiple user groups?
Windows has share and NTFS (Security tab) permissions. How do those interrelate?
When using Linux to access Windows resources, do the permissions still apply?
When using Windows to access Linux, do the permissions still apply?
What must be done in order to appropriately secure user data across all platforms?
If people pursue the common good without harming individuals, we might not need to secure Linux or Windows systems. Provide your opinions as to valuing human value and dignity by securing operating systems.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
User-Related Data Storage Within Your Organization
Name
Course
Institution
Date
1 Are there different types of permissions for Linux and Windows systems?
The file permission structure and management differ between Linux and Windows. The file permission structure and management differ as the Linux file system uses UNIX to access permission. There is also permission at the application and network level. The Windows systems allow permission assigned to almost all files for certain users, some groups, and everyone. In this case, everyone can be the authenticated users, system users, network users, and guests. In Windows, the subfolders and children inherit permissions.
2 How are permissions inherited when users are members of multiple user groups?
A subfolder inherits permissions from the parent folder. However, users allowed to change permissions can assign different permissions to a subfolder than the inherited folder permissions for the groups. If the permissions on a subfolder are overridden and the subfolder has subfolders, the subfolders inherit the override permissions. Users also acquire permission through group membership such that one has permission if they get them in one or different groups. Still, if permissions are overridden, then subfolders inherit these permissions.
3 Windows has share and NTFS (Security tab) permissions. How do those interrelate?
Share permission resources focus on sharing resource (s), while security permission focuses on NTFS permission. One can select a user or group and allow or deny sharing permission, while the security tabs allow changing permission for NTFS permission. Giving NFTS permission to a group provides permission to many people simultaneously (Panek, 2019). Additionally, they can access files or folders depending on whether they choose, allow, or deny configured permission options.
4 When using Linux to...
π Other Visitors are Viewing These APA Coursework Samples:
- System Architecture based on software components2 pages/β550 words | APA | IT & Computer Science | Coursework |
- Employers Monitoring Internet Activities of Employees Working From Home2 pages/β550 words | APA | IT & Computer Science | Coursework |
- Software Engineering Concept Map: Software Development6 pages/β1650 words | APA | IT & Computer Science | Coursework |
- Cybercrime Perpetrator Analysis1 page/β275 words | 3 Sources | APA | IT & Computer Science | Coursework |
- Signature Assignment: Long-Range IT Plan Focusing on Innovation3 pages/β825 words | 1 Source | APA | IT & Computer Science | Coursework |
- Types and Methods of Backup for Linux and Windows1 page/β275 words | APA | IT & Computer Science | Coursework |
- Firewall Architecture Analysis. Which architecture for deploying a firewall is most commonly. . .1 page/β275 words | APA | IT & Computer Science | Coursework |