Protecting Executables

PART 1

Discussion: Protecting Executables

Don't use plagiarized sources. Get Your Custom Essay on
Protecting Executables
Just from $13/Page
Order Essay

In addition to applying access controls to end users and objects, you can apply them to applications as well. This takes two forms—internal to the application and through the operating system.

You can assign an application its own user ID and directories. From there, you can grant the application rights only to the files and directories it needs to run and explicitly deny access to the rest of the system. This gives the application a sandbox to work in.

Answer the following question(s):

If you apply access controls to the network (firewalls and intrusion prevention systems) and end users, why would you need to apply access controls to applications?

Fully address the questions in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.

 

PART 2

Assignment: Developing Access Control Strategies for Data and File Systems

Learning Objectives and Outcomes
  • Develop an access control plan using layered security concepts.
Assignment Requirements

You are a security professional. You have been asked to develop strategies to protect data and file systems in a small Linux environment. The environment contains a Linux application server, a Linux web server, and 30 workstations and laptops. Several users connect to the network from their personal mobile devices.

For this assignment:

  1. Develop layered access security strategies that protect data at rest, data in motion, and file systems.
  2. Prepare a brief summary report describing an access control plan for implementing the strategies. The report should include the purpose of the plan, steps in creation of the plan, and brief implementation procedures.
Required Resources