home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Comp…er Concepts (3rd Edition) / NP3CD_Intro.iso / NP3CD / PAGE377.PAG < prev    next >
Graphics Interchange Format  |  1997-11-02  |  49KB  |  623x1043  |  8-bit (115 colors)
Labels: chat room | crt screen | hakham | monitor | plant | sky | stairs
OCR: DATA EGIRTY C K M EM EN 9-21 Use Rig hts Second Line of Defense What if a hacker slips past the security screening? One way to limit the amount of damage from break-in is to assign user right s. User rights are rules that limit the directories and files that each can access When you receive ar account on computer syst e term, the systerm administra ator gives You rights that allow you to access Oorr particular directories pue files FOF example in your computer lab you have only read rights to the directories that contain software. This would prevent you from deleting or changing the programs on lab compute ers Most networks and host computers allow the system administrator to assign user rights such as those in Figure Figure 9-17 User rights Rights Description Erase rights Allow you to era ...