Sample Essay on:
Permissions in Win2003 and UNIX

Here is the synopsis of our sample research paper on Permissions in Win2003 and UNIX. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

A 4 page paper examining permissions in Win2003 and UnixWare 7.1.1, Open UNIX 8.0.0 and UnixWare 7.1.3. In keeping with the traditional view of Microsoft, it appears that UNIX systems offer greater control to the system administrator in terms of distinguishing between groups and levels of access that members of those groups can attain. Bibliography lists 5 sources.

Page Count:

5 pages (~225 words per page)

File: CC6_KSitSecW2003unix.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

between Microsoft users and UNIX devotees continues largely unabated. Servers using any UNIX platform or Win2003 perform essentially the same functions, but they arrive at the same ends by means of different pathways. The purpose here is to examine permissions in each. Win2003 Microsoft made some security changes in Win2003 that represented improvements over Win2000. "The permissions work the same in Win2003, except Microsoft has improved the interface and added a management feature called Effective Permissions" (Smith, 2003). This change allows system administrators to view user or group access level without "implementing the ACLs and group memberships" (Smith, 2003). Win2003 servers use a Security Account Manager (SAM) database, facilitating local user accounts on the local computer (Smith, 2003). Win2003 default permissions for root directories were changed from Win2000s full access for everyone. Smith (2003) observes that had this change been made at an earlier date Microsoft would have been able to avoid "at least one security bulletin in 2002." Shinder (2005) notes that Microsoft made other changes in Win2003 "to make it more secure out of the box," but that some believe that "Server 2003s defaults are still too open" (Shinder, 2005). Win2003 adds cross-forest trusts, using "Kerberos v5 or NTLM, routing the authentication requests across forests" (Shinder, 2005). Administrators role is that they have the ability to control "the scope of authentication between two forests that have a trust relationship, using selective authentication" (Shinder, 2005), by manually setting permissions "on the domains and resources to which you want to grant access to users in the other forest" (Shinder, 2005). UNIX Security has always ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now