Preview

fdsdf

Satisfactory Essays
Open Document
Open Document
455 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
fdsdf
UNIX Protection Scheme
Lacey MacPhail

POS 355
Alicia Pearlman
8/19/2013

UNIX Protection Scheme
There is an operation system that supports 5,000 users, and the company only wants to allow 4,990 users permission to access one file. In order to have a protection scheme in UNIX, a number of operations need to be performed first in order for this to work. UNIX file management hierarchy is very essential to know in order to understand and devise a plan that will allow this protection scheme to protect the files. Without knowledge of the hierarchy of the file management system within the UNIX operating system, there is no way that the 4,990 will have access to only one file.
A file access control scheme will be the design of UNIX operating system. Therefore, user ids and passwords are needed in order to gain access to the system. All users of the UNIX operating system will each be given a user id and a user password. These user ids and passwords will be kept by the assigned users only. The protection of these ids and passwords depend on how well the user protects them. Encryptions and decryptions can also be used when the users are attempting to login. The administrator can put each user into different groups that allow access or deny access to certain files within the operating system. By doing this, there can be control on who can access what file due to the permission given to them by the administrator. The administrator is referred to as the super user because he or she has access to all files throughout the operating system.
Now, there are users assigned to their designated group within the operating system. Each group has certain privileges and restrictions throughout the operating system which were assigned by the system administrator. The administrator will be able to determine who deserves what privilege, and who has to be restricted from accessing certain files. In other words, 4,990 users will be grouped together to have



References: Stallings, W. 2012. Operating System: Internals and Design Principles. Pearson Education Inc. 2012.

You May Also Find These Documents Helpful

  • Best Essays

    This new system will allow them to save files and documents onto a new server, creating a centralized file system storage system, where only approved representatives are permitted. Having a centralized storage/retrieval system, also helps to secure the information being shared across the network. This also creates efficiency as only the server needs to be backed up, as opposed to having to secure many individual and independent workstations. In addition to…

    • 2802 Words
    • 8 Pages
    Best Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    6. Enabling Store Passwords Using Reversible Encryption determines whether Windows stores passwords using reversible encryption. Enabling this is essentially the same as storing passwords in plain text which is insecure and not recommended.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    7. In terms of file or directory permissions, what does U-G-O stand for? User Group Other What are the 3 permission that can be given to a file or directory? r=read w=write x=execute…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unix is a multifunctional platform capable of handling several users accessing the same applications and files at once. It accomplishes this by setting up a permissions hierarchy and assigning users into groups. As multifunctional as it is, several problems still exist. For one, it has a command line interface. There is no graphical user interface. Second, privilege changes are made either one by one or all at once. Anything else would need to be scripted.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…

    • 302 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    NT1430 Unit 1

    • 4876 Words
    • 18 Pages

    3. What are multiuser systems? Why are they successful? Multiuser systems allow any people to use all system resources almost simultaneously. Successful due to being cost effective, and having a level of security that allows Linux users to protect their data from access by other users through means of file access permissions, which limits users to what they can read, write to, or which file they can execute. Also implements ACLs (Access Control Lists) in which gives users and administrators finer-grained control over file access permissions.…

    • 4876 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    * All the changes being done in the system of the organization can be traced out as the person who is using the system will have to login with the given user credentials, henceforth it protects the sensitive…

    • 665 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    When it comes to the topic of database security head just do not turn the way benchmarking world records and reports of ever-shorter downtimes do. However, security breaches do turn heads as well as undermine customer confidence, as the well-publicized thefts of credit card numbers from a few e-businesses showed in 2000. Databases introduce a number of unique security requirements for their users and administrators. On one hand, databases are designed to promote open and flexible access to data. On the other hand, this same open access makes databases vulnerable to many kinds of malicious activity. Moreover, as more businesses participate in the e-space, it becomes particularly important to separate private from public data. Securing a database involves not only establishing a strong policy, but also establishing adequate access controls. In this paper, we will discuss several of the various nuances of Database security.…

    • 2857 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Protection Scheme in UNIX

    • 354 Words
    • 2 Pages

    As there is a requirement to support 5,000 users within an organization, there are certain ways in which access to a particular file can allow access to 4,990 users in total. Within UNIX, file access is maintained through the file system and structure that is maintained below the single root folder, ‘/ '.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Dbms (Obms & Oracle 91)

    • 4599 Words
    • 19 Pages

    In data-intensive applications, security of data is a major concern. Users should be given access only to required data and not the whole database. In a file-based system, this can be handled only by additional programming in each application.…

    • 4599 Words
    • 19 Pages
    Better Essays
  • Good Essays

    operating system

    • 654 Words
    • 3 Pages

    The user can apply various operations on such files like add, modify, delete or even remove the entire file.…

    • 654 Words
    • 3 Pages
    Good Essays

Related Topics