From the course: Data Steward Foundations
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Access control lists
From the course: Data Steward Foundations
Access control lists
- [Presenter] In a discretionary access control system resource owners have the ability to set and modify permissions for other users of the system. File owners manage file system permissions by the creation of access control lists. An access control list is simply a table containing usernames and the permissions granted to each user on a resource. For example, I might own a file on a computer governed by a discretionary access control system and decide that I want other users to access my file. I might grant one user the ability to edit the file and a large group of users the ability to read that file, each of those decisions would require an entry on an access control list. The NTFS file system used by Windows implements access control lists and allows users to assign a variety of permissions. Full control is just what the name implies. The user can perform any action on the file or folder. Read permission allows the user to view the contents of the file while read an execute…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Goals of information security2m 10s
-
(Locked)
Preserving data confidentiality2m 26s
-
(Locked)
Protecting data integrity2m 57s
-
(Locked)
Maintaining data availability1m 36s
-
(Locked)
Identification, authentication, and authorization3m 2s
-
(Locked)
Discretionary access controls2m 26s
-
(Locked)
Access control lists4m 46s
-
(Locked)
Role-based access control1m 28s
-
(Locked)
Managing the data lifecycle4m 42s
-
(Locked)
Generative AI7m 55s
-
(Locked)
-
-
-
-