A security mechanism which enforces policy describing which requesters may perform operations on specified objects. There are typically multiple types of operations. Common operations include: read, write, execute, append, create, and delete.

learn more… | top users | synonyms

5
votes
4answers
183 views

How can i deal with management who want 'Domain Admin' access?

While I primarily work with penetration testing for my company (A small/medium sized company with approx 50 employees), I'm also a part time member of their sys-admins team (it's handy to keep up-to ...
0
votes
0answers
35 views

Application access control and time-keeping software [closed]

I am looking for software that controls and logs access to a program installed on a Windows XP machine which controls an instrument in a analytical chemistry lab to prevent unauthorized use and track ...
0
votes
0answers
61 views

Writing a script to tell which users are currently typing? [closed]

I'm working on a lab for a cyber-security class and need to find out when certain users are communicating with each other (through named pipes). The users use: python gameProgram.py And then that ...
6
votes
1answer
83 views

Using / finding covert channels in inter-process communication

I've got a class exercise that involves a virtual game of Werewolves/Mafia. We're not really taught how to do anything in this class, which makes it hard for everyone to do the labs. The idea is that ...
-2
votes
0answers
69 views

AVG has locked my read and write ability in the hosts file [closed]

I installed AVG to my laptop. My 13 year old son does online high school. I had used the system32 hosts file to block websites he goes to instead of doing homework. It worked just fine. The problem is ...
5
votes
1answer
72 views

Is there a secure way to have a publicly facing terminal server?

TL;DR We are looking at opening port 3389 for a terminal server all the advice I’ve seen is that its suicidal but without good explanations as to why. Is it really that bad? We are looking at setting ...
-3
votes
0answers
56 views

Website blockage [closed]

I have a series of websites hosted at the same server. The issue I am having is that it keeps blocking me access from different means to the sites. Allow me to explain: From my IP, Blocked. From ...
2
votes
3answers
92 views

Why are UNIX-like ACLs not a form of MAC

What is the reason for UNIX-like access permissions (both the traditional user-group-others and extended ACLs) being classified as a form of DAC (Discretionary Access Control) system and not MAC ...
2
votes
2answers
110 views

Prevent unauthorized workstations from joining a Windows Domain

Corporate policy only allows users to connect corporate-issued machines to the network managed by Active Directory. Is there some means to log or otherwise detect when the same user account joins the ...
-1
votes
1answer
72 views

For a Broker/Dealer, what technology is appropriate to limit transaction to a given state? [closed]

The SEC allows for individuals to not register with them if they don't permit business with users outside of the state: A broker-dealer that conducts all of its business in one state does not ...
3
votes
3answers
164 views

Using /usr/bin/passwd as login shell

I have a requirement to set up a SSH tunnel between two hosts. SSH server runs on a Linux host, and the SSH client (PuTTY) runs on a Windows host. I have set up a separate user account (say 'tunnel') ...
2
votes
3answers
107 views

MySQL database access prevention

I am doing a PHP website for a client who deals with third party financial information, and he is concerned about the developmers (me) having access to all the information, which is obviously a valid ...
-1
votes
1answer
53 views

Giving privilege with validity in Windows 7

In parental control I can restrict the games, applications, and also set time for usage. But how can I grant some privilege (like using some application or playing games) with a validity? To be more ...
0
votes
1answer
140 views

OAuth: client credentials vs tokens

Wouldn't it be much simpler and virtually equally secure to replace tokens by pure client credentials? Client credentials wouldn't expire and resource owners would always be able to modify their ...
3
votes
2answers
89 views

Authorising use of apps from a public store with no back end service

I have a project I'm involved in which needs to distribute a mobile app to a specific audience. Due to regulatory restrictions in the target market, only this audience is allowed to access the data ...

1 2 3 4 5 10
15 30 50 per page