Question: This requires Linux and Windows. I'm new with those two things. Short descriptions would help me. Consider the key differences between a mandatory protection system
This requires Linux and Windows. I'm new with those two things. Short descriptions would help me.

Consider the key differences between a mandatory protection system and a discretionary protection system For Linux, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a Linux shell script that runs these commands, and prints out a "yes" or no" answer to the question of whether it is a discretionary protection system. Submit this shell script as "Lastname_firstname_Linux.sh". In your assignment document, outline the steps taken in point form and briefly explain why they prove the protection system is discretionary b. In Windows, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a batch file that that runs these commands, and prints out a "yes" or "no" answer to the question of whether it is a discretionary protection system. Submit this batch file as "Lastname_firstname_Windows.cmd". In your assignment document, outline the steps taken in point form and why they prove the protection system is discretionary. Write a Linux shell script that finds all files on the entire system that contain a given text C. string (supplied at the script's command line), and changes the permissions of each such file such that only root has read and write permissions. Note that your script should handle any error conditions by printing out a descriptive error message to the shell before exiting. Submit your script with the filename "Lastname firstname restrictfiles.sh" Consider the key differences between a mandatory protection system and a discretionary protection system For Linux, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a Linux shell script that runs these commands, and prints out a "yes" or no" answer to the question of whether it is a discretionary protection system. Submit this shell script as "Lastname_firstname_Linux.sh". In your assignment document, outline the steps taken in point form and briefly explain why they prove the protection system is discretionary b. In Windows, how would you demonstrate that it has a discretionary protection system? Consider the specific steps and shell commands you would use for such a demonstration. Write a batch file that that runs these commands, and prints out a "yes" or "no" answer to the question of whether it is a discretionary protection system. Submit this batch file as "Lastname_firstname_Windows.cmd". In your assignment document, outline the steps taken in point form and why they prove the protection system is discretionary. Write a Linux shell script that finds all files on the entire system that contain a given text C. string (supplied at the script's command line), and changes the permissions of each such file such that only root has read and write permissions. Note that your script should handle any error conditions by printing out a descriptive error message to the shell before exiting. Submit your script with the filename "Lastname firstname restrictfiles.sh
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
