Introduction to UNIX-family File Permissions

Learning Tree’s System and Network Security Introduction course begins with a description of the four fundamental concepts of cyber security: authentication, confidentiality, integrity, and availability. That leads into a discussion of authorization: “who is allowed to do what.” The conclusion is the “access equation”: Authentication + Authorization = Access (We also discuss situations where access is […]
Read More ›

I suggest a permissions contract

A recent post on Lifehacker about using social media logins on other sites got me to thinking: what impact do those permissions social media and smartphone apps really mean anyway? I have always been reluctant to use Facebook’s apps. It seems they want permissions they don’t really need. Why do they need to post on […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.