Chapter 4 Sharing Files
FIGURE 4.0.F01: Sharing files for reading on Microsoft Windows 8.1. Used with permission from Microsoft.
FIGURE 4.0.F02: Microsoft’s basic file-sharing window. Used with permission from Microsoft.
FIGURE 4.0.F03: Editing the “survey” user group on Windows. Used with permission from Microsoft.
FIGURE 4.0.F04: The Task Manager’s process display on Microsoft Windows. Used with permission from Microsoft.
FIGURE 4.0.F05: OS X padlock unlocks with an administrator’s password. Screen shot reprinted with permission from Apple Inc.
FIGURE 4.0.F06: User account control pop-up window. Used with permission from Microsoft.
FIGURE 4.0.F07: Unix file permissions for a typical file.
FIGURE 4.0.F08: Unix directory listing command “ls.”
TABLE 4.0.T01: Ambiguous access rules
TABLE 4.0.T02: Policy additions for tailored sharing of the survey files
TABLE 4.0.T03: Security controls for Tina and the shared project files
TABLE 4.0.T04: Security controls for the file-sharing policy in Table 3.5
FIGURE 4.0.F09: Macintosh ACL for Bob and Tina’s shared file. Screen shot reprinted with permission from Apple Inc.
FIGURE 4.0.F10: Modifying the rights on a Macintosh ACL entry. Screen shot reprinted with permission from Apple Inc.
FIGURE 4.0.F11: Choosing users for a group in Apple’s OS X. Screen shot reprinted with permission from Apple Inc.
FIGURE 4.0.F12: Access control list from Microsoft Windows. Used with permission from Microsoft.
FIGURE 4.0.F13: Denying access in a Windows ACL. Used with permission from Microsoft.
FIGURE 4.0.F14: Advanced security settings for Windows ACLs. Used with permission from Microsoft.
FIGURE 4.0.F15: Revised ACL for the survey folder. Used with permission from Microsoft.
FIGURE 4.0.F16: Adding to inherited rights in a Windows ACL. Used with permission from Microsoft.
FIGURE 4.0.T05: Access rights applied to the stolen files
TABLE 4.0.F17: Trojan game copies one of the survey files.
FIGURE 4.0.F18: Windows security event log. Used with permission from Microsoft.
FIGURE 4.0.F19: Event logging in the operating system.