Case Study: Blue Lady Tree Collectors

Improved Essays
Section 1
1. A discretionary system the management is set by an administrator on the system in which the administrator will award right of entry to files and programs. The administrator establishes the clearances individuals can be given. An example would be that Joe, John, Amber, and Shellie all work at company Blue Lady Tree Collectors. The company has hired an outside agency to manage the computer network as well as the files and programs. The outside agency was given the information of who needed access to what files and programs and setup access control lists for the four employees. Joe who is the owner has full rights to everything. John is a new employee that has just graduated from college and is given read only access to the files
…show more content…
SELinux uses the mandatory access control and therefore it is able to control who and what has access to items within the system. But is it the most secure item out to protect systems from attack. I believe that it does do a wonderful job of protecting, but it does not give the total security that is necessary to protect. The reason why I believe that it does not give the total security that is needed is due to the fact that it is an open source system that is out there for all to see and view and know all the available vulnerabilities. If an assailant knows of an opening he or she will exploit that vulnerability to his or her gain. The ability to know the code and see where the openings are in my opinion does open the system up to an assault. Sure there are multiple ways to distribute the information on how the vulnerabilities can be solved and patched, but the idea is to make it as difficult to get in and have less of a reaction to an assault when it happens and therefore help prevent the assault altogether. The assailants are out there and have the ability to put in an assault and modify it at any given time. The ability to prevent the assault in my opinion is the best defense. If an assault can be thwarted before it starts rather than react to it after it has been discovered is a much better concept. I know SELinux is a product that was developed to be used by the NSA, but I also believe that places a greater target on it since there are assailants that are doing everything in their power to gain access to items that they believe are important and things the government has assailants want just to be able to say look what I have done and they could not stop me from getting in and out without being

Related Documents

  • Decent Essays

    11-39 a. Control C. If the amount recorded to the customer account is incorrect, whether because the amounts were recorded to the wrong customer account in error or because customers' checks were stolen, mailing a monthly statement to customers with outstanding balances will help control this error or fraud because the customer is likely to let the creditor know that the amount they are reported as owing is incorrect, especially if the statement says they owe more than what they actually owe. b. Control G. If employees were required to compare documents required to ship the goods with the documents required to bill the customer, then the employees would not ship the goods to the customers without billing them because they would notice no…

    • 911 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    7. Application Access Control Access to programming, framework utilities and project source libraries might be controlled and confined to those approved clients who have a sensible industry need frameworks or database administrators. Approval to utilize an application might rely on upon the accessibility of a permit from the supplier. Give security from unapproved access by any utility, OS software, and malicious programming that is equipped for bypassing framework or application controls.…

    • 118 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    1. Ethernet Ethernet is a combination of computer networking technologies most commonly used in local, metropolitan, and wide area networks. 2. Server A computer or computer program that manages access and distributes information through a centralized service in a network.…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Lab #5: Introduction to Metasploit on Kali Linux Team: CRYPTERS 1 d. Why is it usually a bad idea to operate in the Linux environment as root? If you are unfamiliar with the concept of the root user, do a quick google search. It is always a good practice on any operating system to run your applications on a user level and leave the administrative tasks to the root user, and only on a per-need basis. Applications are meant to be run by users with non-administrative privileges.(Power December 4, 2010)…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    The Trustees of the Davis Conservation Foundation require that you provide a completion report. If the project is not completed within 12 months of receipt of funds, please provide a brief written progress report in the interim. 1. What were your original goals and objectives for this project and to what extent were they achieved?…

    • 705 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Unit 8 P1

    • 787 Words
    • 4 Pages

    Newsletter Legal Issues: Data Protection Act 1998 This law is designed so that your personal information is protected. It protects your data in which is stored on the pc and hard copies. This act gives the people the right to know what information about them is being stored. It protects information such as your name, address, employment history, credit records etc.…

    • 787 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Before Franklin Delano Roosevelt was inaugurated as President, more than 25% of the population was unemployed. The New Deal agencies gave these families a chance when they had no hope. One of those successful agencies was the CCC–Civilian Conservation Corps. Locally there is Clarkco State Park in Quitman, MS that was founded and built by the CCC. Currently there is the CCC Legacy that was founded to not let the history and purpose of the CCC die after it was disbanded in 1942.…

    • 1049 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The assignment for unit four has asked that I write a paper outlining some of the key highlights and notable points about the profession that I have chosen to pursue. The more I study and review the career field of a Healthcare Administration, the more excited I get about the possibilities that potentially await me. There are many different types of work that a person could get into with this particular field, but I am going to focus mainly on the Healthcare Administrator field as it pertains to a hospital or clinic. When a person chooses the vocation of Healthcare Administrator they have basically accepted a lifestyle that will for a time require a tremendous amount of time and effort in order to be successful. This person will spend long hours in the office completing all types of paperwork for regulatory items and then after they leave the office, go to a community function and promote their organization.…

    • 1232 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    From the onset of the Great Depression, people were able to seek financial help with the aid of the New Deal programs initiated by the government. These government actions proved their worth by many people who had their lives ruined due to the stock market crash. One of these programs that FDR enacted in order to restore the country was the CCC or the Civilian Conservations Corps. People involved with this program are reported to have an overall positive view on the world afterwards. From all of the people who registered for the program, one man by the name of Keith Hufford said, “In May, 1933, I was one of the many jobless disillusioned young men……

    • 196 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Conservation Officer Protecting nature, catching criminals, and enjoying the great outdoors, there's nothing like the daily life of a conservation officer. In the criminal filled world of the outdoors we need someone to protect and keep it safe. Who could this be you may ask? The answer is conservation officers. Officers enforce fish and game laws and work to help and protect nature.…

    • 496 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Conservation 1. Email yourself the article. ✔️ 2. Copy and paste the MLA citation. "Conservation."…

    • 491 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Executive summary California Plant Protection (CPP) is a medium sized security firm, which is considering expanding their business by buying a larger firm named Pinkerton. The first bid was $85 million but this was rejected, and CPP was informed that any bids under $100 million would face the same result. The key questions we have addressed are whether a $100 million bid for Pinkerton can be justified and if so, how the acquisition should be financed. We find the value of Pinkerton for CPP to be greater than $100 million and that financing alternative 1 generates the greatest value for CPP. Based on this we recommend Wathen to increase the bid to $100 million and finance this with 75% debt and 25% equity.…

    • 715 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Case Study 2 ACCT-504-61405 Situation A: - In evaluating the internal control over inventory for the Williams Oil Services Company, an auditor learns that the warehouse receiving clerk is responsible for ordering parts for supply inventory use in drilling services, counts the inventory when received at the dock, records the receipts into the inventory ledger, and takes the annual inventory, No supervisor reviews the receiving clerk’s work. Missing Internal Control characteristics for William Oil Services: - In the William’s case oil Services Company, The missing internal control characteristic is Monitoring Control, The clerk is the only person who has to maintain all the inventory related records.…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    According to Miller (2015:126) The concertive control theory tries to explain how power connections or relationships can be changed at the period of team based and alternative form of organisations .There are three concepts that are important in the concertive control theory, the first one is control, there are three types of control, the first one is simple control it has to do with who has the position to direct people in the work place, who has authority in the work place. The second one is technological control which deals with control through the technological workplace process which can the computer systems or programmes ,the third one is burcancraric control it has to deal with power based on status and the legal rules.…

    • 1632 Words
    • 7 Pages
    Great Essays