Preview

File Management

Good Essays
Open Document
Open Document
572 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File Management
File Management
Amanda Dyer
POS/355
September 4, 2014
August Smith

File Management
File management in any computer system is a very crucial function. Proper file management alleviates everyday issues in file protection, to allow a smooth experience for users. Using file protection for operating systems, such as Unix, can be very easy and simple. Unix is a multiuser operating system that is used on a wide range of machines from powerful microcomputers to supercomputers (Stallings, 2012). In Unix, permissions are configured to allow owner(s) to define different permissions of files by restricting or permitting access where needed. These permissions are set to categories of owner, group, and other permissions. In early versions of file control and access for Unix, users where assigned a user identification number. These users also were members of groups and a group identification number identified each group. Now when a file is created by a user, not only is the file owned by a specific owner, but by the owners primary group as well. Attached to files are protection bits, where read, write, and execute permissions are specified and carried down to other users of the group/groups the owner belongs to. Anyone can see the issue that lies in this type of file access control. What happens when the owner desires only specific users or no users at all to have access to the created file?
Several modern Unix-based operating systems are supporting protection schemes called Access Control Lists or ACLs. Unix-based systems include big named operating systems such as, Linux, FreeBSD, and Solaris. Implementing this type of protection scheme provides controlled access to certain files, guaranteeing the availability and integrity of the files is always maintained. Suppose your company had an organization that supports 5000 users. Your company had a file that 10 users of the company were not allowed access to the file. What



References: Stallings, W. (2011). Operating Systems: Internals and Design Principles(7th ed.). New Jersey: Prentice Hall Rhodes, T. (Ed.). (n.d.). 14.9. Access Control Lists. Retrieved from https://www.freebsd.org/doc/handbook/fs-acl.html

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    DACL is a list of Access Control Entries (ACE) that store the information about which user(s) has access to a secure object, such as a file.…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control list (ACL) A collection of access control entries that defines the access that all users and groups have to an object.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…

    • 302 Words
    • 1 Page
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    New studies and tests are showing that when it comes to music and colors our brains think more like each other then we ever knew before. When the music is high tempo and a faster pace most people relate this to a brighter yellow color, but when the music is a little darker and slower they relate to a grayish-bluish hue. “So Mozart's jaunty Flute Concerto No. 1 in G major tends to be associated with bright yellow and orange, whereas his dour Requiem in D minor is more likely to be linked to dark, bluish gray.” It is amazing to see the kinds of discoveries they are able to make my just simple recognition.…

    • 478 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Files

    • 1706 Words
    • 7 Pages

    In the history of hockey Gordie Howe was not only one of the greatest players to ever hit the ice he was literally a game changer. On and off the ice it was easy to tell from his early playing days in the USHL that Gordie was special. Gordie Howe possessed skills never seen by any hockey player before and rarely seen since. Howe would very quickly evolve, later being signed by the NHL’s Detroit Red Wings in 1946. Over the next 33 years Gordie Howe was in the game of pro hockey (NHL or WHA). He set numerous records over the years such as most goals ever scored in NHL history at 801 (since surpassed by Wayne Gretzky) and most NHL games ever played. Gordie Howe’s impact on the games will be remembered forever. For being able to change the way hockey was played Gordie Howe was able to evolve and shape the game of hockey over the 33 years in which he played is how Gordie Howe has contributed to the shaping of Canada’s identity.…

    • 1706 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Linux vs Windows vs Mac

    • 1355 Words
    • 6 Pages

    Operating systems are the link between the user and the applications and the hardware. They are responsible for deciding how the user commands will be interpreted and how the operating system itself will carry the process. There are several different types of operating and each carries out processing in their own way. Windows, UNIX/Linux and Mac are some of the most popular and widely used operating systems.…

    • 1355 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Most computers are used for data processing, as a big growth area in the “information age”…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Image Management

    • 581 Words
    • 3 Pages

    The world around us is changing and changing at a faster pace than we realize!! The importance of Image management cannot be overlooked….…

    • 581 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Files

    • 477 Words
    • 2 Pages

    Investing in common stocks can be compared to gambling. Commit the capital in a stock that becomes insolvent will lose the investment or invest in a stock price, which increases by a hundred percent in a one-year period. Over long periods of time, investments in a diversified portfolio of common stocks have earned positive returns, whereas long-term venture results in negative returns. This study aims to provide an understanding what the risks of investing in common stocks are and knowing the ways to reduce it helps in managing investments to earn positive returns. In essence, the objectives, personal characteristics, and time frame outline the level of risk an investor can absorb, which then determines the choice of investments to make.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Files

    • 399 Words
    • 2 Pages

    Local government in Angeles City, Pampanga, my hometown, has been ruled under the political dynasties of the Lazatin’s and Nepomuceno’s for the past several decades. According to my parents and yaya (a retired teacher of a local public school here in Angeles), the Nepomuceno’s are known throughout the whole Angeles city to be one of the wealthiest (if not the wealthiest) families in Angeles. They own and have monopolized our local ice plant, electric power plant, and multiple institutions including the largest university in Angeles, one private high school, 2 subdivisions and 1 cemetery. Plenty of these are not only high-earning enterprises already in nature but their properties are also the ones that comprise of the high-end services in Angeles. I myself have just discovered that my family and I have been living in a house, for 17 years (renting), owned by the Nepomucenos – inside their subdivision as well. Not only do they dominate the private sector but also the local government sector as well and have held about 20 positions (mostly mayors) in the past 5 decades, which were taken by Nepomucenos.…

    • 399 Words
    • 2 Pages
    Good Essays