Our second lab section of IT security course is to learn about how three security principles which are confidentiality, integrity, and availability works. During lab section, En. Mohd Zaki has explained to us the difference between FAT and NTFS. Both of FAT and NTFS are file system for Windows but NTFS has provided local file security which does not in FAT. After explanation, we are required to understand lab sheet and follow instructions in lab sheets.
I have used VMware Workstation to perform this lab activity. Before do any changes in virtual machine, I take snapshot so that virtual machine can roll back to saved status after lab activity end. After that, I check C-Drive in virtual machine to ensure that NTFS is installed in order to continue lab activity. This is because without NTFS, local file security cannot occur. First task that I performed is to verify confidentiality of data. For the first task, I have created two users which are user1 and user2 besides create a Confidentiality folder with a User1Folder inside. I changed the security setting of User1Folder to let user1 only has full control on it. As the result, I can see the content of User1Folder if I login as user1 but access is denied if I login as user2. This has proven that data confidentiality occurs because information is accessible to those authorized to have access only.
For second task, I create an Availability folder with user2Folder inside and I changed user2Folder security setting to allow user2 has full control. After that, I try to open user2Folder and the access is successful. Follow by, I login in as Administrator and delete user2 account from local security database and then create a new user which also named as user2. But the access is denied when I try to open user2Folder by login as user2. This is because user2 account that has full control is no longer exists. This showed that data availability occurs by allowing information available for use by its intended users.
For third task, I login as user1 and create a new folder of Integrity with User1Folder inside. Then, I create a text document in User1Folder and save it. After that, I login as user2 and try to modify text document that save by user1. I can modify the contents of file but unexpectedly I couldn’t save the file! From the third task, I understand how data integrity works. Data integrity prevents modification of information by unauthorized user.
As the conclusion, local file security is important to protect information from unauthorized access and allow information available for use or modification of information by its intended users only.
I have used VMware Workstation to perform this lab activity. Before do any changes in virtual machine, I take snapshot so that virtual machine can roll back to saved status after lab activity end. After that, I check C-Drive in virtual machine to ensure that NTFS is installed in order to continue lab activity. This is because without NTFS, local file security cannot occur. First task that I performed is to verify confidentiality of data. For the first task, I have created two users which are user1 and user2 besides create a Confidentiality folder with a User1Folder inside. I changed the security setting of User1Folder to let user1 only has full control on it. As the result, I can see the content of User1Folder if I login as user1 but access is denied if I login as user2. This has proven that data confidentiality occurs because information is accessible to those authorized to have access only.
For second task, I create an Availability folder with user2Folder inside and I changed user2Folder security setting to allow user2 has full control. After that, I try to open user2Folder and the access is successful. Follow by, I login in as Administrator and delete user2 account from local security database and then create a new user which also named as user2. But the access is denied when I try to open user2Folder by login as user2. This is because user2 account that has full control is no longer exists. This showed that data availability occurs by allowing information available for use by its intended users.
For third task, I login as user1 and create a new folder of Integrity with User1Folder inside. Then, I create a text document in User1Folder and save it. After that, I login as user2 and try to modify text document that save by user1. I can modify the contents of file but unexpectedly I couldn’t save the file! From the third task, I understand how data integrity works. Data integrity prevents modification of information by unauthorized user.
As the conclusion, local file security is important to protect information from unauthorized access and allow information available for use or modification of information by its intended users only.
No comments:
Post a Comment