Kyle Allen Richmond, Sr.
POS 355 / Introduction to Operating Systems
University of Phoenix
When it comes to UNIX systems all user data is organized and stored in files. These files are subsequently organized into a management structure comprising of directories and sub-directories. Much like forest and organizational units when it comes to active directory, UNIX also has the directories and sub-directories organized into a tree-like structure that it calls a file system. UNIX also has three basic types of files. When it comes to security files can be secured through UNIX file permissions as well as access control lists (ACLs).
One of the most important things to keep in mind when giving permissions is to establish file and directory ownership. Traditional UNIX file permissions can assign ownership to three classes of users that are: user, group, and others. The user class is usually the file or directory owner, and that is the individual that created the file. The owner of a file can decide who has the right to read the file, or have the ability to write the file; which means they can make changes. This is effective if you had an organization that has five thousand employees and you only wanted four thousand nine-hundred ninety people to have permission to view and/or make changes. Another ability that the owner has is to decide if the file is a command or to execute the file. Groups are where you can put a number of users together to establish permissions. It is an effective way to manage policies for users. The others class is all other users who are not the file owner and are not members of the group. An important thing to note is that the owner of a file can usually assign or modify file permissions. Additionally the root account can change a file’s ownership to override system policy.
In UNIX there are four different types of file permissions. The first permission is read and it designates which users can open and read the contents of a file only, but cannot make any changes. The second is the write permission, and that designates which users can modify the contents of a file or even delete the file. The next file permission that can be given is the execute permission. This permission designates which users can execute the file if it is a program or shell script. Another thing it does is that those individuals with this permission can also run the program with one of the exec system calls. The denied permission designates which users cannot read, write, or execute file.
The types of file permissions apply to regular files, and to special file such as devices, sockets, and named pipes (FIFOs). A great way for any business organization to protect their files effective and to ensure that only people that have the need to access the appropriate is information is to apply the few protective measure that was discussed. You can protect the files in a directory by setting restrictive file permission on that directory.
References
UNIX File Management. (n.d.). Retrieved from http://www.le.ac.uk/oerresources/bdra/unix/page_34.htm
Using UNIX Permission to Protect Files. (2012). Retrieved from http://docs.oracle.com/cd/E23824_01/html/821-1456/secfile-60.html
References: UNIX File Management. (n.d.). Retrieved from http://www.le.ac.uk/oerresources/bdra/unix/page_34.htm Using UNIX Permission to Protect Files. (2012). Retrieved from http://docs.oracle.com/cd/E23824_01/html/821-1456/secfile-60.html
You May Also Find These Documents Helpful
-
This could happen for multiple reasons, the user could either have conflicting permissions or there could be multiple users manipulating the file. The user may have modify permissions in NTFS but the share folder permissions may be stricter, read-only; the most restrictive permissions takes precedence. For the user to be able to modify the file, the permissions should be loosened. The problem may also be that another user modified the file while our user had the file open, this would prevent the file to be modified. The user can save another copy of the file and re-write the original file…
- 603 Words
- 3 Pages
Powerful Essays -
The Filesystem Hierarchy Standard (FHS) is a reference describing the conventions used for the layout of a UNIX system. It has been made popular by its use in Linux distributions, but it is used by other UNIX variants as well. The Linux Standard Base (LSB) refers to it as a standard. In the FHS all files and directories appear under the root directory "/", even if they are stored on different physical or virtual devices. Note however that some of these directories may or may not be present on a Unix system depending on whether certain subsystems, such as the X Window System, are installed.…
- 401 Words
- 2 Pages
Satisfactory Essays -
2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…
- 571 Words
- 4 Pages
Satisfactory Essays -
When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…
- 989 Words
- 4 Pages
Powerful Essays -
With a umask value of 112, what are the default permissions assigned to newly created files?…
- 1593 Words
- 7 Pages
Satisfactory Essays -
A Database is generally used for storing data in a structured way in an efficient manner for insert, update and retrieval of data in well defined formats. On the other hand, in file system the data stored in unstructured manner with an unrelated data.…
- 1178 Words
- 5 Pages
Powerful Essays -
It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…
- 689 Words
- 3 Pages
Good Essays -
The different information systems are filing cabinets where hard copies are stores or electronically which can be saved changes can be made and they can be made safe with a password.…
- 1681 Words
- 7 Pages
Better Essays -
Why is it particularly popular in academia? Why is the Linux filesystem referred to as hierarchical? Linux is popular because it is not only consistent of multiple free distribtuions, but its popular in academics because the source code is easily available. It arranges files in a directory then places those files in another directory and repeats this process until it reaches the root directory 3.…
- 680 Words
- 10 Pages
Satisfactory Essays -
You should become comfortable using the Linux command line and the online help utilities to manage files and directories.…
- 297 Words
- 3 Pages
Satisfactory Essays -
Computers store data ondisks using files, which are structured in specific ways in order to allow for faster access, higher reliability, and to make better use out of the drive's available space. The specific way in which files are stored on a disk is called a file system, and enables files to have names and attributes. It also allows them to be stored in a hierarchy of directories or folders arranged in a directory tree.…
- 4639 Words
- 19 Pages
Powerful Essays -
Reliable and accessibility is the largest challenge to managing data, text, and documents. If permissions are not set up properly then anyone ca n make changes to a document which can cause a problem for whom ever wishes to use the data. If there are several copies of the same file it to can cause…
- 697 Words
- 3 Pages
Satisfactory Essays -
A.3. Please note that /root is root user’s home directory, which is not same as /.…
- 1383 Words
- 6 Pages
Satisfactory Essays -
The different information systems are filing cabinets where hard copies are stores or electronically which can be saved changes can be made and they can be made safe with a password.…
- 802 Words
- 4 Pages
Satisfactory Essays -
Now you have been selected to tryout for the best team around. Next comes the hard work and time you have to put into it. This is when most people give up because it's simply work, plus the drills and rules.…
- 630 Words
- 3 Pages
Good Essays