0% found this document useful (0 votes)
2K views

NIS Practical 4

This practical aims to teach students how to apply security to file folders and applications using access permissions. It involves setting permissions for users and groups that specify what access they have, such as read, write, modify, etc. The document outlines the procedure for adding security through permissions in Windows. It also lists the skills, outcomes, theoretical background, resources, assessment scheme and questions developed from this practical.

Uploaded by

Omkar Khutwad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views

NIS Practical 4

This practical aims to teach students how to apply security to file folders and applications using access permissions. It involves setting permissions for users and groups that specify what access they have, such as read, write, modify, etc. The document outlines the procedure for adding security through permissions in Windows. It also lists the skills, outcomes, theoretical background, resources, assessment scheme and questions developed from this practical.

Uploaded by

Omkar Khutwad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Practical No. 04: Apply security to file folder or application using access permissions and verify.

I. Practical Significance

By setting permissions, it specify what users are allowed to do within that folder, such as save and delete files
or create a new folder.
Hence student should be able to apply security to file folder or application using access permisions like -Full
Control, Modify, Read & Execute, List Folder Contents, Read, and Write.

II. Relevant Program Outcomes

PO-1: Basic & Discipline Specific Knowledge


PO-2: Problem analysis
PO-3: Design/development of solutions
PO-4: Engineering Tools, Experimentation and Testing
PO-5: Engineering practices for society, sustainability and environment
PO-7: Life Long Learning

III Competency and Practical Skills

This practical is expected to develop the following skills

a. Provide security to file folder or application using access permisions and verification.

IV. Relevant Course Outcomes

a. Apply user identification and authentication methods.


V. Practical Outcomes

a. Apply security to file folder or application using access permisions and verification

VI. Relevant Affective domain related Outcomes

1. Follow safety Practices-I

2. Handle network component carefully

3. Demonstrate working as a leader/a team member


4. Follow ethical practices
VII. Minimum Theoretical Background

Every file and every folder in Windows has its own set of permissions. Permissions can be broken down
into Access Control Lists with users and their corresponding rights. 

Permissions are also either inherited or not. Normally in Windows, every file or folder gets their permissions
from the parent folder. This hierarchy keeps going all the way up to the root of the hard drive. The simplest
permissions have at least three users: SYSTEM, currently logged in user account and the Administrators group.

These permissions usually come from the C:\Users\Username folder on your hard drive.

There are basically six types of permissions in Windows: Full Control, Modify, Read & Execute, List Folder
Contents, Read, and Write.

VIII. Procedure

Apply security to file folder


1. Right click the folder or file and click “Properties” in the context menu

2. Select the Security tab.

3. Click Edit.

4. Click Add...

5. In the Enter the object names to select text box, type the name of the user or group that will have access to

the folder.

6. Click OK.

7. The Permissions dialog box reappears.

8. In the Group or user name section, select the user(s) you wish to set permissions for

9. In the Permissions section, use the checkboxes to select the appropriate permission level

10. Click Apply

11. Click Okay

The new permissions are added to the file or folder.


IX. Resourse Required

Sr.No Name of Resourse Specification Quantity Remark


1 Computer System Operating System- 1 Available
Windows 7
RAM-2GB
Processor-Intel
(R)Core(TM) 2Duo
CPU

X. Practical Related Questions

1. Define 1. Access 2. Access control and state the need of access control.
2. Which are the access control policies?
3. List the access control mechanisms used to implement access policies?
4. What are the different file and folder permissions?
5. State the need for applying security to file folder or application
6. Write principles of access control.
7. Which are the role of people in security?

XI. References/ Learning Resources for Further Reading

a) http://nptel.ac.in/courses/106105162/  
b) https://www.tutorialspoint.com//computer_security/computer_security_quick_guide.htm  
c) http://learnthat.com/introduction-to-network-security/
d) https://freevideolectures.com/course/3027/cryptography-and-network-security  
e) https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-
fall-2014/video-lectures/  
f) http://stylesuxx.github.io/steganography/
g) https://smartninja-pgp.appspot.com/
h) http://www.cyberlawsindia.net/cyber-india.html 
i) https://www.upcounsel.com/cyber-law  
j) http://cyberlaws.net/cyber-law/

XII. Skills Developed:

a. Ability to apply security to file folder or application using access permissions.


XIII. Assessment Scheme

Sr.No. Performance Indicators Weightage


in %
Process Related(15Marks) 70%
1 Logic Formation 30%
2 Effective practical Implementation 30%
3 Follow ethical practice 10%
product Related(10Marks) 30%
4 Practical related questions 10%
5 Completion and submission of practical in 10%
time
4 Expected outut/observation 10%
Total(25 Marks) 100%

Names of Student Team Members

1. .....................................
2. .....................................
3. .....................................

Marks Obtained Dated Signature of


Teacher
Process related(15) Product Related(10) Total(25)

You might also like