Question

In: Operations Management

You can use up to three levels of security and protection to control who can access...

You can use up to three levels of security and protection to control who can access and change your Excel data. Please describe two of the three levels and how you access each of them.

Solutions

Expert Solution

Explanation:

First level security is when you lock file:

In order to unlock and access you have to set password for file as per below step.

  • Go to excel file then click File – Save As.
  • Choose location where you want to save it, Folder, Desktop.
  • In the Save As dialog box, choose the specific folder you like, after that click Tools and after that click General Options.
  • You will get a dialog box named - Generals Options where you can set password to open file and password to make modification in file – set a password for both.
  • Then Click Save.

Second level of security is to lock worksheet.

In order to Secure Worksheet you have to protect that Worksheet.

  • You will see Review tab on tab menu click on that, then you see Protect Sheet option click on that.
  • Dialog box will open where you can set area you want to allow user to modify, Choose the area.
  • You have to check the Protect worksheet and content of locked cells and enter a password in Password to unprotect sheet to protect sheet from getting open and modify.

Related Solutions

in ACL (access control List) : 1.How do you determine who can access object x? 2....
in ACL (access control List) : 1.How do you determine who can access object x? 2. How do you determine which objects user y can access? 3. What happens if a file is deleted?
For Network Access Control and Cloud Security You are required to research and report on this...
For Network Access Control and Cloud Security You are required to research and report on this topic according to the Detail of Question below. A. Select one paper to: Read, understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as...
Q4. Out of three levels of security I.e. Infrastructure security, Application security and Operational security, we...
Q4. Out of three levels of security I.e. Infrastructure security, Application security and Operational security, we can only deal with application security. Although it is the area we work on, but overall security of even our application depends upon the organizational security policies. Do you agree? Comment using an example. Q5. There are 4 types of security threats namely, Interception, interruption, modification and fabrication. As a software programmer, what threat is the one you may work to avoid and how?...
Explain how designing an access control standard relates to system security practices.
Explain how designing an access control standard relates to system security practices.
What are some physical security design elements for alarm/access control systems servers?
What are some physical security design elements for alarm/access control systems servers?Why is Physical Security design elements for alarm/access control systems/servers so crucial in a data center?
Discuss telecommunication operations and three (3) security measures to ensure     protection of information.
Discuss telecommunication operations and three (3) security measures to ensure     protection of information.
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to...
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to certain network and system resources. 2. T/F. When establishing firewall rules, the most prudent configuration is to implicitly deny by blocking all traffic by default then rely on business need and justification to create new rules as exceptions. 3. T/F. By default, all virtual private network (VPN) client software encrypts network traffic. 4. T/F. Asymmetric encryption is more secure than symmetric encryption.
Do we have an ethical responsibility to maintain up-to-date antivirus protection and other security software on...
Do we have an ethical responsibility to maintain up-to-date antivirus protection and other security software on our personal computers to prevent our computer from being infected with remotely-controlled software that harms others? Should a law require that everyone install such software? Consider analogies from several other technologies or areas
HIPAA security , physical safeguard give examples of the following : 1) user-based access control 2)...
HIPAA security , physical safeguard give examples of the following : 1) user-based access control 2) role-based access control 3) context-based access control
Name two main types of access control methods in a security system. Sub-categorize each of them...
Name two main types of access control methods in a security system. Sub-categorize each of them separately by four sub-types. For each main type access control methods you named, compare and contrast the four sub-types you have listed. Use tables to present their respective advantages and disadvantages. Based on your discussion in earlier parts or otherwise, propose access control(s) system for a domestic airport terminal building.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT