O'Reilly logo

CCNA Cyber Ops SECOPS - Certification Guide 210-255 by Andrew Chu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Reading files

Files are accessed by a user through either the command line or the GUI. If the file is not an executable (a program/application), another piece of software is required to open it. In Chapter 1, Classifying Threats, confidentiality was discussed. In order to maintain confidentiality, it is important for the operating system to control who has permission to access each file. 

For single user files, this can be done by having user areas. In order to access a different user's area, the user would have to log out and log in as the other user. This makes collaboration very difficult, and therefore business – and increasingly home – settings need a different system of control.

In Windows Server environments, Management of Access Control ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required