▶ 3.5 File Security Controls
Let us look at the access permissions required to implement the user isolation policy for Bob’s tower computer. The policy appears in Tables 3.3 and 3.4. First, let us look at access rights for executable programs. FIGURE 3.12 illustrates the appropriate access rights, using two executable files as examples. Regular users receive Read and Execute access. The “System” user receives full access to the file.
Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.