Practical No. 04: Apply security to file folder or application using access permissions and verify.
I. Practical Significance
By setting permissions, it specify what users are allowed to do within that folder, such as save and delete files
or create a new folder.
Hence student should be able to apply security to file folder or application using access permisions like -Full
Control, Modify, Read & Execute, List Folder Contents, Read, and Write.
II. Relevant Program Outcomes
PO-1: Basic & Discipline Specific Knowledge
PO-2: Problem analysis
PO-3: Design/development of solutions
PO-4: Engineering Tools, Experimentation and Testing
PO-5: Engineering practices for society, sustainability and environment
PO-7: Life Long Learning
III Competency and Practical Skills
This practical is expected to develop the following skills
a. Provide security to file folder or application using access permisions and verification.
IV. Relevant Course Outcomes
a. Apply user identification and authentication methods.
V. Practical Outcomes
a. Apply security to file folder or application using access permisions and verification
VI. Relevant Affective domain related Outcomes
1. Follow safety Practices-I
2. Handle network component carefully
3. Demonstrate working as a leader/a team member
4. Follow ethical practices
VII. Minimum Theoretical Background
Every file and every folder in Windows has its own set of permissions. Permissions can be broken down
into Access Control Lists with users and their corresponding rights.
Permissions are also either inherited or not. Normally in Windows, every file or folder gets their permissions
from the parent folder. This hierarchy keeps going all the way up to the root of the hard drive. The simplest
permissions have at least three users: SYSTEM, currently logged in user account and the Administrators group.
These permissions usually come from the C:\Users\Username folder on your hard drive.
There are basically six types of permissions in Windows: Full Control, Modify, Read & Execute, List Folder
Contents, Read, and Write.
VIII. Procedure
Apply security to file folder
1. Right click the folder or file and click “Properties” in the context menu
2. Select the Security tab.
3. Click Edit.
4. Click Add...
5. In the Enter the object names to select text box, type the name of the user or group that will have access to
the folder.
6. Click OK.
7. The Permissions dialog box reappears.
8. In the Group or user name section, select the user(s) you wish to set permissions for
9. In the Permissions section, use the checkboxes to select the appropriate permission level
10. Click Apply
11. Click Okay
The new permissions are added to the file or folder.
IX. Resourse Required
Sr.No Name of Resourse Specification Quantity Remark
1 Computer System Operating System- 1 Available
Windows 7
RAM-2GB
Processor-Intel
(R)Core(TM) 2Duo
CPU
X. Practical Related Questions
1. Define 1. Access 2. Access control and state the need of access control.
2. Which are the access control policies?
3. List the access control mechanisms used to implement access policies?
4. What are the different file and folder permissions?
5. State the need for applying security to file folder or application
6. Write principles of access control.
7. Which are the role of people in security?
XI. References/ Learning Resources for Further Reading
a) http://nptel.ac.in/courses/106105162/
b) https://www.tutorialspoint.com//computer_security/computer_security_quick_guide.htm
c) http://learnthat.com/introduction-to-network-security/
d) https://freevideolectures.com/course/3027/cryptography-and-network-security
e) https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-
fall-2014/video-lectures/
f) http://stylesuxx.github.io/steganography/
g) https://smartninja-pgp.appspot.com/
h) http://www.cyberlawsindia.net/cyber-india.html
i) https://www.upcounsel.com/cyber-law
j) http://cyberlaws.net/cyber-law/
XII. Skills Developed:
a. Ability to apply security to file folder or application using access permissions.
XIII. Assessment Scheme
Sr.No. Performance Indicators Weightage
in %
Process Related(15Marks) 70%
1 Logic Formation 30%
2 Effective practical Implementation 30%
3 Follow ethical practice 10%
product Related(10Marks) 30%
4 Practical related questions 10%
5 Completion and submission of practical in 10%
time
4 Expected outut/observation 10%
Total(25 Marks) 100%
Names of Student Team Members
1. .....................................
2. .....................................
3. .....................................
Marks Obtained Dated Signature of
Teacher
Process related(15) Product Related(10) Total(25)