Last day of the OFFER FLAT 20% off & $20 sign up bonus Order Now

Last day of the offer FLAT 20% off & $20 sign up bonus

us

Free Resources

  • icon 75000+ Completed Assignments
  • icon 1500+ PhD Experts
  • icon 100+ Subjects we cater
  • icon 100% Secure Payment

BUS206 Management Information Systems

Published : 15-Sep,2021  |  Views : 10

Questions:

1. A co-worker with a strong Windows background is having difficulty understanding UNIX file permissions. Describe UNIX file permissions for him. Compare UNIX file permissions to Windows file permissions.

2. How are authentication and authorization alike and how are they different. What is the relationship, if any, between the two?

3. What is a VPN and what technologies are used to create one?

Answers:

1. UNIX File Permission

The clone of UNIX is LINUX. UNIX is an operating system that deals with multi user that is it can be used simultaneously by many users. UNIX is used in servers and mainframes without altering them (Cai et al., 2015). This feature of UNIX gives rise to security concerns which includes an unauthorized user to remove, change or corrupt data. The authorization of UNIX are divided into two parts-

Ownership- This includes three types of ownership- User, Group and Others. In user ownership as user who creates the file is the owner of that file. In group ownership, a file is accessible by all the members of the group and other ownership is like any users other than owner and group have access to the file.

Permission- The permission authorization includes three parts in it. Read, where permission is given to read the file, write where permission is given to write on the file and alter the contents and execute where the permission is given to run the file.

Comparison of UNIX file permission to Windows file permission

UNIX File Permission

Windows File Permission

1. Very old version of file permission

New in comparison to UNIX

2. The files are accessed to owners, groups and to others who are given permission to read, write and execute the file.

All the authenticated users, system users, guests and networks users have access to the file.

3. Security Enhanced Linux concept is added to provide security.

No such security is provided.

4. Application level control.

Fine grain user level control.

5. Effective permission structure for application and web servers.

Ideal for management and storing of file.

Table: Difference between Windows File Permission and UNIX File Permission

2. Comparison between Authentication and Authorization

Authentication

Authorization

1. The identity of user is verified by the process of authentication (Hernandez-Ramos et al., 2015).

The process where it is checked that the user has the access to a particular file is known as authorization.

2. Authorization is always preceded by authentication.

Allows a user who is authenticated to access the file or resource.

3. Two separate levels are there in authentication.

Authorization is given to user in three ways- read, write and execute.

4. Additional schemes such as forms authentication, windows authentication and passport authentication are present.

File authorization and URL authorization are present.

3. Virtual Private Network and its Technologies

Virtual Private Network (VPN) is a network that allows the user of internet to block the access to content that is present in the web (Theodoro et al., 2015). The online experiences of the user are also secured by VPN (Virtual Private Network) and are remained anonymous by tools such as encryption process. A Virtual Private Network allows user to chat on the forums, access the sport streams and also can download music. The restrictions of the content are fully avoided by Virtual Private Network. Different types of VPN are there and all the types use different protocols but the main function is maintained by Virtual Private Network that is to secure the information and to encrypt them.

The technologies that are needed to create a Virtual Private Network are (Alshalan, Pisharody & Huang, 2016): VPN Client, VPN Server, IAS Server, Firewall, tunneling protocol and Authentication protocol.

References

Alshalan, A., Pisharody, S., & Huang, D. (2016). A Survey of Mobile VPN Technologies. IEEE Communications Surveys & Tutorials, 18(2), 1177-1196.

Cai, X., Lale, R., Zhang, X., & Johnson, R. (2015, April). Fixing Races For Good: Portable and Reliable UNIX File-System Race Detection. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (pp. 357-368). ACM.

Hernandez-Ramos, J. L., Pawlowski, M. P., Jara, A. J., Skarmeta, A. F., & Ladid, L. (2015). Toward a lightweight authentication and authorization framework for smart objects. IEEE Journal on Selected Areas in Communications, 33(4), 690-702.

Theodoro, L. C., Leite, P. M., de Freitas, H. P., Passos, A. C. S., de Souza Pereira, J. H., de Oliveira Silva, F., ... & Cardoso, A. (2015). Revisiting Virtual Private Network Service at Carrier Networks: Taking Advantage of Software Defined Networking and Network Function Virtualisation. ICN 2015, 84.

Our Amazing Features

delivery

No missing deadline risk

No matter how close the deadline is, you will find quick solutions for your urgent assignments.

work

100% Plagiarism-free content

All assessments are written by experts based on research and credible sources. It also quality-approved by editors and proofreaders.

time

500+ subject matter experts

Our team consists of writers and PhD scholars with profound knowledge in their subject of study and deliver A+ quality solution.

subject

Covers all subjects

We offer academic help services for a wide array of subjects.

price

Pocket-friendly rate

We care about our students and guarantee the best price in the market to help them avail top academic services that fit any budget.

Not sure yet?

Get in touch with us or

get free price quote.

Get A Free Quote