1Running head: COMPLIANCE- USER RIGHTS AND PERMISSIONSCompliance- User Rights and PermissionsName:Institution:Course Code:COMPLIANCE- USER RIGHTS AND PERMISSIONSCompliance- User Rights and PermissionsThe first exercise, managing file system security using permissions wasimportant for the sole reason of authorization. Indeed, information is vital in any organizationand data management systems. Although information systems involve the use by a variety ofindividuals, sensitivity various forms of data require selected authorized individuals to access thesame. As such, the management of file system security makes it possible to only share relevantdata to individuals authorized for the same (Robertson, 2012). The volatile nature of suchinformation makes this data the target of cyber attackers.The second exercise, understanding system auditing was particularly importantbecause it helps to develop and implement correct auditing practices. System auditing involvesthe scrutiny of possible breaching avenues by attackers. As such understanding, the auditingmethodologies ensure auditors can effectively detect breaching activity by cyber attackers. If asystem a ...
To Order an Original Plagiarism Free Paper on the Same Topic Click Here
Other samples, services and questions:
When you use PaperHelp, you save one valuable — TIME
You can spend it for more important things than paper writing.