• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 16. A NETWORK SECURITY PRIMER > Understanding Share Permissions

Understanding Share Permissions

Once users have gained access to the network, they will need to access network resources. We already discussed network shares and print resources in Chapter 8.of access to the data.

However, an important aspect of sharing information on the network is keeping highly sensitive or proprietary data secure as it is shared. This means some users will have access to the information and some won't. It also means that your users will have different levels


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint