Preview

File Management

Satisfactory Essays
Open Document
Open Document
463 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File Management
File Management Paper

POS 355
Jan 30, 2014

File Management Paper
Introduction
In this paper, we will discuss how to specify a file protection scheme in UNIX. File management is a critical function in any computer system. From file creation to file protection, proper file management can alleviate common issues allowing a smoother user experience.
Background
UNIX has a very distinct file system. While the file directory system is similar to Windows, the users Graphical Users Interface (GUI) is not. UNIX utilizes a command line prompt where Windows provides an actual GUI to interact inside the file system. The standard double-click icon will not pertain to this paper. UNIX users are primarily system developers, programmers, and administrators. A common computer user, such as my workplace, primarily executes operations in a Windows based environment.
Protection Scheme Traditional In traditional UNIX, “each UNIX user is assigned a unique user identification number (user ID)” (Stallings, 2012) or UID. When a user creates a file, his or her UID is attached to that file and designated as the owner. The user is also a member of a primary group as well as other groups. Allowing 4990 users access to this single file would require a users UID to be a member of either the creator’s primary group or in the group of the file’s parent directory with the proper SetGID permission set. In protecting this file, Bishop states “there are twelve permission bits in the protection word of a file; they customarily divided into groups of three (Bishop, 1987).” The bits represent the encoded permissions for the file’s owner and details how the file protection scheme is set.
Modern
More up to date UNIX and UNIX operating systems such as FreeBSD, OpenBSD, Linux, and Solaris use an access control list for permission setting and file protection. Stallings states “the administrator assigns a list of UNIX user IDs and groups to a file by using the setfac1 command.



References: Bishop, M. (1987). File Protection in UNIX. Retrieved from http://nob.cs.ucdavis.edu/bishop/papers/1987-decpro/filepro.pdf Stallings, W. (2012). Operating Systems: Internals and Design Principles (7th ed.). Boston, MA: Prentice Hall.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    9. What does the command chmod do? lets you change permissions of a file What happens when I use it with the following?…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In this report I will briefly explain about the features and functions of different operating systems. I have chosen to compare windows 7 Mac OS.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT1430 Chapter 6 labs

    • 297 Words
    • 3 Pages

    You should become comfortable using the Linux command line and the online help utilities to manage files and directories.…

    • 297 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Quiz 5

    • 507 Words
    • 9 Pages

    When assigning permissions, it is best to assign them to ____________ rather than to individual…

    • 507 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Better Essays

    "Admin Tools - User 's Guide :: Fixing the permissions of files and directories." Admin Tools - User 's Guide :: Fixing the permissions of files and directories. https://www.akeebabackup.com/documentation/admin-tools/fixing-permissions.html (accessed January 14, 2014).…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Admins have access to all files, and other users have access to program files/windows only.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    The type of access controls and permissions that are probably configured are Modify , Read or Full control.…

    • 503 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    When we take a look at the access control list some users have a R by their name which means that they are able to only read the file that they are associated with. Some users with have a W which means that they will be able to actually write and make changes to the file. Some users will have a X which means that they can execute the file. In order to add users to a group a manager, or the company 's system administrator would have to go in and assign individual users to each group.…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    microsoft notes

    • 1216 Words
    • 5 Pages

    A user has been granted Full Control to a NTFS folder on your computer. The user has created all the documents that exist in the folder. Another administrator accidentally adds a permission setting denying the Write permission to that user. The next time that user logs in and opens the file, when they try to save their changes to the file they will notice?…

    • 1216 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Lab 1 Essay Example

    • 504 Words
    • 2 Pages

    DACL is a list of Access control entries; it defines access control for users and groups.…

    • 504 Words
    • 2 Pages
    Good Essays
  • Good Essays

    File access is very important for any organization. The organization has to make sure that the proper personnel are given access to the files that they need to work on or need to get information they need. Even more important than to give the right personnel access, keeping unauthorized users from entering the files is more important. For the scenario of a system that supports 5,000 users and only 4,990 of said users would have access to one file, UNIX was used. Each user would have a masked entry that will specified if the user is allow to do anything to the…

    • 699 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    Access Control Lists are used by OS’s such as Windows and UNIX. An ACL is a table that informs the OS of each users access rights to an object within the system, the object could be a program, a single file or a folder. Although ACL’s do the same task in a similar way, the different OS’s each have a different way of carrying it out.…

    • 3039 Words
    • 13 Pages
    Powerful Essays