Preview

File Management

Satisfactory Essays
Open Document
Open Document
372 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File Management
Option 1- File Access The first version of UNIX had a file access scheme where the users where assigned a UID known as a user identification number. The user was also apart many groups but had a main group. The groups where identified by a group id, so as files were created they were assigned to a user that had that particular id attached to the user.

The file is also put in a specific group; this would be the creator where it originated or the parent directory. Within the file it has something called protection bits and 9 of the bites have the permission read, write and execute. These permissions are for the owner of that particular file. When assigned to the directory the bits will be able to rename, delete or re-create files, this really helps to manage files that are in a shared directory.

Lastly, the access control scheme is really a simple protection for the domain structure. The domain is linked with the user and if anything is changed the user’s id will be affected.

Option 1- File Access Within UNIX there are two ways to allow users access to one file. First and for most you would need to create a list called and access control list with all 4990 users on it. Then add the 4990 users in a group giving the group access as they need it. You have to keep in mind that the scheme is not implemented since each group (s) can be restricted by the system.

Next would be giving all users universal access to the files, now if their name shows up on the access control list and has different permission then they will not have the access. Basically by doing using this scheme, you can put the remaining users (10) on the control list but you would not give them access privileges like the 4990 users have.

Instead of an access lists that coincide with each file, it would be better to have a user control list that is associated

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Study Guide

    • 508 Words
    • 3 Pages

    * Access control: Access to the password file is limited to one or a very few…

    • 508 Words
    • 3 Pages
    Good Essays
  • Good Essays

    • Editor - user/users group with access rights to change database data documents; user/users group with access rights to change…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    This could happen for multiple reasons, the user could either have conflicting permissions or there could be multiple users manipulating the file. The user may have modify permissions in NTFS but the share folder permissions may be stricter, read-only; the most restrictive permissions takes precedence. For the user to be able to modify the file, the permissions should be loosened. The problem may also be that another user modified the file while our user had the file open, this would prevent the file to be modified. The user can save another copy of the file and re-write the original file…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 1593 Words
    • 7 Pages

    With a umask value of 112, what are the default permissions assigned to newly created files?…

    • 1593 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    The company that I work is need of a file system, one that can support 5000 users or more. This particular system was designed to allow multiple users to access the same file, in doing so there must be a way to protect the data that is being accessed by all of those users.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    Is the process of determining if an authenticated user has access to the resources they requested. Is finding out if the person, once identified is permitted to manipulate specific resources. This is usually determined by finding out if that person is of a particular role that has access to the resources. Authorization is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    Samba is used for the file server and has many features to restrict access to what is shared. This includes enforcing password requirements, filtering at the network level, and a check going against group memberships (Jang, 2011).…

    • 295 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Resume

    • 1027 Words
    • 5 Pages

    * Hands on experience in implementing security and sharing rules at object, field, and record level for different users at different levels of organization. Also created various profiles and configured the permissions based on the organizational hierarchy…

    • 1027 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Companies need a strong architecture to protect user data. It is essential to have access control lists (ACL) on all network devices to avoid data breaches by cyber criminals.…

    • 986 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Smart Card Access Control

    • 3570 Words
    • 15 Pages

    In this assignment, the newest established bank has employed me as one of their colleague to be the Project Manager of IT Department of Yale Bank. As the Yale Bank has been growing commercially, they need to address the increasing number of employees by automating the access control of each department to protect their company’s interest. Only selected number of employees that has the valid credentials can enter or have access to a certain offices and electronic files that can be accessed through various system tools.…

    • 3570 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Sample Feasibility Study

    • 1065 Words
    • 5 Pages

    Since the proposed solution is a web based solution, Security and control are provided through definable role-based…

    • 1065 Words
    • 5 Pages
    Powerful Essays