Discussion Post: Protecting Executable
In addition to applying access controls to end users and objects, you can apply them to applications as well. This takes two forms-internal to the application and through the operating system.
You can assign an application its own user ID and directories. From there, you can grant the application rights only to the files and directories it needs to run and explicitly deny access to the rest of the system. This gives the application a sandbox to work in.
Answer the following question(s):
If you apply access controls to the network (firewalls and intrusion prevention systems) and end users, why would you need to apply access controls to applications?
Fully address the questions in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students' views.
The response should include a reference list. Using one-inch margins, Times New Roman 12 pnt font, double-space and APA style of writing and citations.