Question: This requires Linux and Windows. I'm new with those two things. Short descriptions would help me. Consider the key differences between a mandatory protection system

This requires Linux and Windows. I'm new with those two things. Short descriptions would help me.

This requires Linux and Windows. I'm new with those two things. Short

Consider the key differences between a mandatory protection system and a discretionary protection system For Linux, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a Linux shell script that runs these commands, and prints out a "yes" or no" answer to the question of whether it is a discretionary protection system. Submit this shell script as "Lastname_firstname_Linux.sh". In your assignment document, outline the steps taken in point form and briefly explain why they prove the protection system is discretionary b. In Windows, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a batch file that that runs these commands, and prints out a "yes" or "no" answer to the question of whether it is a discretionary protection system. Submit this batch file as "Lastname_firstname_Windows.cmd". In your assignment document, outline the steps taken in point form and why they prove the protection system is discretionary. Write a Linux shell script that finds all files on the entire system that contain a given text C. string (supplied at the script's command line), and changes the permissions of each such file such that only root has read and write permissions. Note that your script should handle any error conditions by printing out a descriptive error message to the shell before exiting. Submit your script with the filename "Lastname firstname restrictfiles.sh" Consider the key differences between a mandatory protection system and a discretionary protection system For Linux, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a Linux shell script that runs these commands, and prints out a "yes" or no" answer to the question of whether it is a discretionary protection system. Submit this shell script as "Lastname_firstname_Linux.sh". In your assignment document, outline the steps taken in point form and briefly explain why they prove the protection system is discretionary b. In Windows, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a batch file that that runs these commands, and prints out a "yes" or "no" answer to the question of whether it is a discretionary protection system. Submit this batch file as "Lastname_firstname_Windows.cmd". In your assignment document, outline the steps taken in point form and why they prove the protection system is discretionary. Write a Linux shell script that finds all files on the entire system that contain a given text C. string (supplied at the script's command line), and changes the permissions of each such file such that only root has read and write permissions. Note that your script should handle any error conditions by printing out a descriptive error message to the shell before exiting. Submit your script with the filename "Lastname firstname restrictfiles.sh

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!