ABSTRACT

Improper permissions could allow for accidental or

deliberate data manipulation, including the deletion

of critical files.

3. Loss of availability. If permissions are too restrictive,

authorized users may not be able to access data and

programs in a timely manner. However, if permis-

sions are too lenient, a malicious user may manipu-

late the data or change the permissions of others,

rendering the information unavailable to personnel.