NIS Practical 4
NIS Practical 4
I. Practical Significance
By setting permissions, it specify what users are allowed to do within that folder, such as save and delete files
or create a new folder.
Hence student should be able to apply security to file folder or application using access permisions like -Full
Control, Modify, Read & Execute, List Folder Contents, Read, and Write.
a. Provide security to file folder or application using access permisions and verification.
a. Apply security to file folder or application using access permisions and verification
Every file and every folder in Windows has its own set of permissions. Permissions can be broken down
into Access Control Lists with users and their corresponding rights.
Permissions are also either inherited or not. Normally in Windows, every file or folder gets their permissions
from the parent folder. This hierarchy keeps going all the way up to the root of the hard drive. The simplest
permissions have at least three users: SYSTEM, currently logged in user account and the Administrators group.
There are basically six types of permissions in Windows: Full Control, Modify, Read & Execute, List Folder
Contents, Read, and Write.
VIII. Procedure
3. Click Edit.
4. Click Add...
5. In the Enter the object names to select text box, type the name of the user or group that will have access to
the folder.
6. Click OK.
8. In the Group or user name section, select the user(s) you wish to set permissions for
9. In the Permissions section, use the checkboxes to select the appropriate permission level
1. Define 1. Access 2. Access control and state the need of access control.
2. Which are the access control policies?
3. List the access control mechanisms used to implement access policies?
4. What are the different file and folder permissions?
5. State the need for applying security to file folder or application
6. Write principles of access control.
7. Which are the role of people in security?
a) http://nptel.ac.in/courses/106105162/
b) https://www.tutorialspoint.com//computer_security/computer_security_quick_guide.htm
c) http://learnthat.com/introduction-to-network-security/
d) https://freevideolectures.com/course/3027/cryptography-and-network-security
e) https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-
fall-2014/video-lectures/
f) http://stylesuxx.github.io/steganography/
g) https://smartninja-pgp.appspot.com/
h) http://www.cyberlawsindia.net/cyber-india.html
i) https://www.upcounsel.com/cyber-law
j) http://cyberlaws.net/cyber-law/
1. .....................................
2. .....................................
3. .....................................