Why do authorisation lists need encryption and protection since they are so susceptible to unauthorized modification? What type of harm may result from an unforeseen or unexpected change to these files?
Why do authorisation lists need encryption and protection since they are so susceptible to unauthorized modification? What type of harm may result from an unforeseen or unexpected change to these files?
Chapter12: Secondary Storage Management
Section: Chapter Questions
Problem 7RQ
Related questions
Question
Why do authorisation lists need encryption and protection since they are so susceptible to unauthorized modification? What type of harm may result from an unforeseen or unexpected change to these files?
Expert Solution
![](/static/compass_v2/shared-icons/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
![Systems Architecture](https://www.bartleby.com/isbn_cover_images/9781305080195/9781305080195_smallCoverImage.gif)
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
![Systems Architecture](https://www.bartleby.com/isbn_cover_images/9781305080195/9781305080195_smallCoverImage.gif)
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning