Question

In: Operations Management

You can use up to three levels of security and protection to control who can access...

You can use up to three levels of security and protection to control who can access and change your Excel data. Please describe two of the three levels and how you access each of them.

Solutions

Expert Solution

Explanation:

First level security is when you lock file:

In order to unlock and access you have to set password for file as per below step.

  • Go to excel file then click File – Save As.
  • Choose location where you want to save it, Folder, Desktop.
  • In the Save As dialog box, choose the specific folder you like, after that click Tools and after that click General Options.
  • You will get a dialog box named - Generals Options where you can set password to open file and password to make modification in file – set a password for both.
  • Then Click Save.

Second level of security is to lock worksheet.

In order to Secure Worksheet you have to protect that Worksheet.

  • You will see Review tab on tab menu click on that, then you see Protect Sheet option click on that.
  • Dialog box will open where you can set area you want to allow user to modify, Choose the area.
  • You have to check the Protect worksheet and content of locked cells and enter a password in Password to unprotect sheet to protect sheet from getting open and modify.

Related Solutions

Assume that you are an IT Security Manager who needs to develop access control policies for...
Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area and develop five actual policies that you could provide your employees. Please explain your choices and why these policies are important.Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area...
in ACL (access control List) : 1.How do you determine who can access object x? 2....
in ACL (access control List) : 1.How do you determine who can access object x? 2. How do you determine which objects user y can access? 3. What happens if a file is deleted?
For Network Access Control and Cloud Security You are required to research and report on this...
For Network Access Control and Cloud Security You are required to research and report on this topic according to the Detail of Question below. A. Select one paper to: Read, understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as...
Access control can be considered as the central element of computer security. Question 4(a), 4(b), 4...
Access control can be considered as the central element of computer security. Question 4(a), 4(b), 4 (c) and 4(d) based on this information. 4 (a). Relate the principal objective of computer security with the function of access control. 4 (b). Briefly explain how access control being implemented in the machine. 4 (c). If Process A requires 500MB of memory space to perform calculation and Process B requires 100MB of memory space to perform graphics processing, identify the object, subject and...
For Network Access Control and Cloud Security (Cloud Database Encryption Technology Based on Combinatorial Encryption) You...
For Network Access Control and Cloud Security (Cloud Database Encryption Technology Based on Combinatorial Encryption) You are required to research and report on this topic according to the Detail of Question below. A. understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The...
Q4. Out of three levels of security I.e. Infrastructure security, Application security and Operational security, we...
Q4. Out of three levels of security I.e. Infrastructure security, Application security and Operational security, we can only deal with application security. Although it is the area we work on, but overall security of even our application depends upon the organizational security policies. Do you agree? Comment using an example. Q5. There are 4 types of security threats namely, Interception, interruption, modification and fabrication. As a software programmer, what threat is the one you may work to avoid and how?...
Explain how designing an access control standard relates to system security practices.
Explain how designing an access control standard relates to system security practices.
Suggest possible security strategies needed to support encryption and network access control.
Suggest possible security strategies needed to support encryption and network access control.
What are some physical security design elements for alarm/access control systems servers?
What are some physical security design elements for alarm/access control systems servers?Why is Physical Security design elements for alarm/access control systems/servers so crucial in a data center?
Discuss telecommunication operations and three (3) security measures to ensure     protection of information.
Discuss telecommunication operations and three (3) security measures to ensure     protection of information.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT