课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Access control lists

Access control lists

- [Instructor] In a discretionary access control system, resource owners have the ability to set and modify permissions for other users of the system. File owners manage file system permissions by the creation of access control lists. And access control list is simply a table containing usernames and the permissions granted to each user on a resource. For example, I might own a file on a computer governed by a discretionary access control system and decide that I want other users to access my file. I might grant one user the ability to edit the file and a large group of users the ability to read that file. Each of those decisions would require an entry on an access control list. The NTFS file system used by Windows implements access control lists and allows users to assign a variety of permissions. Full control is just what the name implies, the user can perform any action on the file or folder; read permission allows the user to view the contents of the file; while read and execute…

内容