Lab1 - Graduate Program in Information Science and...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Graduate Program in Information Science and Telecommunications and Networking School of Information Sciences University of Pittsburgh TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.2, Last Edited 9/11/2009 Students Name: ______________________________________________________ ______________________________________________________ ______________________________________________________ Date of Experiment: ______________________________________________________ Graduate Program in Information Science and Telecommunications and Networking School of Information Sciences University of Pittsburgh 1 Read the following guidelines before working in the lab General Guidelines There are four (4) computers for use for this lab. They are located in groups of two machines in two separate tables in the lab and are labeled for use in this course. The machines youll use have two operating systems installed on them: Windows Vista Ultimate Edition and Unix/Linux variant called Fedora Core 7. By default the system will boot to the Windows Vista operating system, when you need to work on Unix/Linux you should reboot (restart) the system and press the Enter key when the system reports that it will try to load the operating system (a few seconds after the system is booting up). Then, select Fedora as the operating system to use for you Unix/Linux work. A written report is required for this assignment. You should turn in this printout as part of your written report. Space has been provided to answer some of the questions of the exercises in this lab. However, you should attach extra sheets of paper with your answers for some of the questions. Please label your extra sheets with your name and indicate precisely which questions you are answering. For the Windows Vista assignment you will need to log on and log off from different user accounts quite frequently. The log off option is not very visible in the operation system. So, to log off from an account select Start (the Windows Icon in the lower left corner) and then select the right arrow next to the lock icon presented in the window. The Log Off option should become visible and you can now select it. Graduate Program in Information Science and Telecommunications and Networking School of Information Sciences University of Pittsburgh 2 I: Objective The objective of the exercises presented here are to familiarize the student with the access control features available in the Microsoft Windows and UNIX-based systems and to compare them. II: Equipment/Software A PC with Microsoft Windows 2000/XP or Windows Vista installed on it. A PC with Linux installed on it. III. Access control in Microsoft Windows OS Access control refers to the ability of a user to access a particular object and possibly modify it. In terms of operating systems, access control refers to the ability of a user to read, write or execute a certain file or folder. In this laboratory, we shall study the access read, write or execute a certain file or folder....
View Full Document

Page1 / 16

Lab1 - Graduate Program in Information Science and...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online