Download presentation
Presentation is loading. Please wait.
Published byByron Quinn Modified over 8 years ago
1
Chapter 4 Sharing Files
2
FIGURE 4.0.F01: Sharing files for reading on Microsoft Windows 8.1. Used with permission from Microsoft.
3
FIGURE 4.0.F02: Microsoft’s basic file-sharing window. Used with permission from Microsoft.
4
FIGURE 4.0.F03: Editing the “survey” user group on Windows. Used with permission from Microsoft.
5
FIGURE 4.0.F04: The Task Manager’s process display on Microsoft Windows. Used with permission from Microsoft.
6
FIGURE 4.0.F05: OS X padlock unlocks with an administrator’s password. Screen shot reprinted with permission from Apple Inc.
7
FIGURE 4.0.F06: User account control pop-up window. Used with permission from Microsoft.
8
FIGURE 4.0.F07: Unix file permissions for a typical file.
9
FIGURE 4.0.F08: Unix directory listing command “ls.”
10
TABLE 4.0.T01: Ambiguous access rules
11
TABLE 4.0.T02: Policy additions for tailored sharing of the survey files
12
TABLE 4.0.T03: Security controls for Tina and the shared project files
13
TABLE 4.0.T04: Security controls for the file-sharing policy in Table 3.5
14
FIGURE 4.0.F09: Macintosh ACL for Bob and Tina’s shared file. Screen shot reprinted with permission from Apple Inc.
15
FIGURE 4.0.F10: Modifying the rights on a Macintosh ACL entry. Screen shot reprinted with permission from Apple Inc.
16
FIGURE 4.0.F11: Choosing users for a group in Apple’s OS X. Screen shot reprinted with permission from Apple Inc.
17
FIGURE 4.0.F12: Access control list from Microsoft Windows. Used with permission from Microsoft.
18
FIGURE 4.0.F13: Denying access in a Windows ACL. Used with permission from Microsoft.
19
FIGURE 4.0.F14: Advanced security settings for Windows ACLs. Used with permission from Microsoft.
20
FIGURE 4.0.F15: Revised ACL for the survey folder. Used with permission from Microsoft.
21
FIGURE 4.0.F16: Adding to inherited rights in a Windows ACL. Used with permission from Microsoft.
22
FIGURE 4.0.T05: Access rights applied to the stolen files
23
TABLE 4.0.F17: Trojan game copies one of the survey files.
24
FIGURE 4.0.F18: Windows security event log. Used with permission from Microsoft.
25
FIGURE 4.0.F19: Event logging in the operating system.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.