1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spin [16.1K]
4 years ago
13

Someone once observed that "the difference between roles and groups is that a user can shift into and out of roles, whereas that

user has a group identity (or identities) that are fixed throughout the session."a. Consider a system such as a System V-based UNIX system, in which a process can have exactly one group identity. To change groups, users must execute the newgrp command. Do these groups differ from roles? Why or why not?
Computers and Technology
1 answer:
mestny [16]4 years ago
7 0

Answer:

All things considered newgrp has nothing to do with security jobs.  

newgrp sets the procedures bunch id which is in many frameworks are irrelevant. All gatherings are accessible. Gatherings are characterized as assortment of clients , bunch get to is conceded to documents dependent on the record gathering.  

Regularly (setgroups/getgroups ) all gatherings are in the process get to list.  

The authorization at a document or registry level has a 3 level arrangement of consents, for example, client proprietorship , bunch possession and others. All things considered the document authorization are a mix of read , compose and execute .we need both peruse and execute consent to run a program.  

A procedure may get to the document if a record has a place with the user(the proprietor of the document ) or if the gathering identifier coordinate on the gatherings in the clients bunches list. That entrance is constrained by the relating consents signals on the record.  

Gatherings have been over-burden with some "job" definitions. In any case, these are just over-burden and not a decent utilization of groups,the utilization of a gathering as a job was bolstered by the setgroup id banner , and by utilities like a sudo , where gathering name likewise coordinates a security control. It expect that the gathering name isn't utilized for documents yet once a client is in the gathering that client can apply the gathering to a record regardless of whether it isn't what the gathering was for.  

This over-burden use worked where frameworks didn't bolster genuine jobs. The over-burden utilize was only a work around.  

Linux has genuine job definition bolstered by SELinux models and can be applied to documents , clients , and forms.

You might be interested in
One of your primary business objectives is being able to trust the data stored in your application. You want to log all changes
lord [1]

Answer:

C

Explanation:

Based on the information provided within the question it can be said that the best way to accomplish this would be to digitally sign each timestamp and log entry and store the signature. This is because each timestamp and log entry would be ran through a verification algorithm which would then be stamped with your digital signature that requires your private keys, thus preventing forgery.

4 0
3 years ago
Identify the potential impact to IT security of incorrect configuration of firewall policies and third- party VPNs
yan [13]

Answer:

why is it necessary to fight against social evils and problem

5 0
3 years ago
The __________ was the first all electronic computer.
spayn [35]

Answer:

its the ENIAC

4 0
3 years ago
In Python, a function is _____.
ad-work [718]

Answer:

a group of instructions that can be used to organize a program or perform a repeated task

Explanation:

A function is a group of commands that can be called upon with extra parameters if needed.

Example:

def foo():                          #defining this function and naming it foo

    return True                 #what is performed when foo is called on

if foo() == True:               #foo() is calling on a function named foo

   print('yes')

8 0
3 years ago
Which of the following applies to patents?
babymother [125]
They protect the rights of the property owner. I watch a lot of shark tank and I believe that’s right
3 0
2 years ago
Other questions:
  • Assign a pointer to any instance of searchChar in personName to searchResult.#include #include using namespace std;int main() {c
    5·1 answer
  • Write a new function called "listmax" based on the following IPO # function: listmax # INPUT: a list # PROCESSING: obtains the l
    9·1 answer
  • Edhesive silly questionsj
    8·1 answer
  • Write algorithm to find (a+b)^2=(a+b)*(a+b)​
    9·1 answer
  • How are procedural and object-oriented programming approaches similar?
    9·1 answer
  • How do you view a presentation as your audience would see it?
    14·2 answers
  • The first thing you should select if you're using an Address Block or Greeting Line is
    11·1 answer
  • C++ please
    8·1 answer
  • A Python programmer is writing a function definition. What syntax should be used?
    12·2 answers
  • Dis-cord and/or snap????????????? Im 13 ! and a girl :)))))
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!