Preview

File Management Requirements

Good Essays
Open Document
Open Document
678 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File Management Requirements
File Management Requirements
The following paper will discuss the Unix Operating System and how to implement a protection scheme that permits multiple users access to one file, with the exception of denying access to a particular group of users to the same file. Including the importance of protecting file sharing permissions to users.
Perhaps a business has a system that will support 5,000 users, however only 4,990 users are granted permissions to access one particular file. In order to grant access to 4,990 users, restricted authority is given. This will ensure that only the file needed is available to specific users and will help protect other data and system information from being accessed without permission. If restrictions are not implemented this could cause security issues, and breach of information, could diminish the integrity of the business. In some systems a security policy may be imposed to users whom have rights to access particular files, as well as specific classification to own those rights. (Low, Marie 1993)
UNIX file systems uses a protection scheme that provides sharing and protection of files. By using a protection scheme, owners of said file, manage the control over who will have access to modify, write, and read the files information. The owner may grant access to a group of users, otherwise defined as a subset of user, which will only allow the group of members to create subsets of operations, thus the owner can make changes as necessary. (Stallings, 2012)
If a user creates a file in UNIX, that file and permissions are owned by that particular user. In order to fully access a file, when a user wants to perform a task or operation on a file, the user needs to have read access, write access and execute access. In some instances, the owner may only give one of the accesses, which will limit what other users are allowed to do. Each user has an ID that is instantly compared to the owner’s attributes in order to determine if the asking user



References: Levine, Levine, Unix for Dummies, http://www.dummies.com/how-to/content/exploring- nfs-in-unix.html Low, Marie, ACM SIGOPS Operating Systems Review, ISSN 0163-5980, 01/1993, Volume 27, Issue 1, pp. 33 - 50 Stallings, W. (2012). Operating systems: Internals and design principles (7th ed.). Boston, MA: Prentice Hall.

You May Also Find These Documents Helpful

  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Good Essays

    It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Pt2520 Unit 6

    • 1447 Words
    • 6 Pages

    It occurs when we can change the file structure without affecting the accessibility of the data.…

    • 1447 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    5. [3] Ten processes share a critical section implemented by using a semaphore x. Nine…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    Samba is used for the file server and has many features to restrict access to what is shared. This includes enforcing password requirements, filtering at the network level, and a check going against group memberships (Jang, 2011).…

    • 295 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Reliable and accessibility is the largest challenge to managing data, text, and documents. If permissions are not set up properly then anyone ca n make changes to a document which can cause a problem for whom ever wishes to use the data. If there are several copies of the same file it to can cause…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…

    • 302 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®?…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Unit 1

    • 4876 Words
    • 18 Pages

    3. What are multiuser systems? Why are they successful? Multiuser systems allow any people to use all system resources almost simultaneously. Successful due to being cost effective, and having a level of security that allows Linux users to protect their data from access by other users through means of file access permissions, which limits users to what they can read, write to, or which file they can execute. Also implements ACLs (Access Control Lists) in which gives users and administrators finer-grained control over file access permissions.…

    • 4876 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    final exam

    • 1020 Words
    • 5 Pages

    TCO (6) The Extended two-file system in Fedora Core 4 provides ____ to keep files safe from intruders who might gain unauthorized physical access to sensitive, stored data.…

    • 1020 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    With UNIX systems, including the older ones, at least one user would have access to all areas of the system, the idea of this being so that they control the systems for other users and grant or deny them access to various objects. By doing this, UNIX implies that the administrator should have the most control and other users have fewer privileges to reduce security breaches or damage. UNIX’s method of an ACL is the domain; this consists of pairs of objects and rights. The pair, called a tuple, names the object and what operations can be carried out on it. An object in a domain has up to three rights of access; read, write and execute. An object can be part of a number of domains, if it is, then it can have different rights in each domain that it is a part of. In UNIX, the domain has User and Group ID’s (UID, GID) that defines the protection of that domain. Different combinations of UID and GID’s on different objects allow it to be…

    • 3039 Words
    • 13 Pages
    Powerful Essays

Related Topics