Top-Rated Free Essay
Preview

File System and Group

Good Essays
788 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File System and Group
Unix File Access
POS/355

UNIX® is provides security to directory and the file system. For security reason a file or directory has assigned permissions to use them and every user in the UNIX system is assigned set of permission while creating user account.
Before going to discuss the file permission, let’s discuss the user account types in the UNIX. There are three types of user accounts on a UNIX system that are root account, system account and normal user account. Root account: It is a super account in UNIX system and created when the Operating System installed. It has complete, unfettered control of the system and can run any commands without any restriction. This user account in UNIX system is treated as an administration. System accounts: System accounts are those accounts that are needed for a specific system operation or function of system-specific components. For emailing activity mail system accounts are created. These accounts can perform some specific function on system, and any modifications to them could adversely affect the system. User accounts: User accounts are those accounts that through which system interactive operations can be performed by normal users and groups of users. General users are typically assigned to these accounts and usually have limited access to critical system files and directories.
All these accounts are managed by the system administrator (it is a root account). UNIX supports Group Account concept in which a number of user accounts can be combined with certain permissions and policies. Group account controls the file and directory handling and mange permissions to use these files.
A group account must be created before the creation of user account and it must be added into a group account by using the groupadd UNIX command.
In UNIX every file and directory has read, write and execution access modes. These read, write and execution permission is defined by the Owner or the system administrator. These permissions are differently defined for the owner, group and others.
In UNIX ls –l command is used to view file or directory permissions. It is represented by a 10 character sequences. The first character shows whether the content is a file(-) or a directory(d). The permissions are broken into groups of three owner, group and others and each position in group denotes read (r), write (w), execute (x) permission. The three characters sequence (2-4) represent the permissions for the file or directory owner. If this character sequence is rwx (2-4) that means onwer has permission to read (r), write (w) and execute (x) of this file or directory. The second group of three characters (5-7) consists of the permissions for the group to which the file belongs. The last group of three characters (8-10) represents the permissions for other users of the system. Normally other system users have read (r) only permission.
Read (r), write (w) and execute (x) permissions can be changed for any group through the UNIX chmod command.
File access mode read, write and execute is different from the directory access mode. In the file access read mode a file contents are readable by the user but in case of directory he can read the file names only. In write access mode user can add some contents to the file where as in case of director user can add a file into directory.
In this case of a system that can supports maximum 5000 users to access a file. And this system is restricted to access a file no more than 4990 users. To protect a file for a limited access, it would be better to use group user accounts.
The system administrator will create all 5000 user accounts and will create a group account. Administrator will add all 4990 user into a group. All the user and group accounts will require administrative access. All 4990 user are in a group and these users are allowed to access the file for read, write or execution purpose depends on the group’s permissions.
Other 10 users are outside the group, so these are general user accounts and not have any permission to access any file or directory that is permitted for the group users only.
To make a system that allow to access a file for 4990 user out of 5000 user, it is necessary to create a group account of 4990 users. Other 10 user are general user accounts, would not allow to access group’s files.

References UNIX permissions help. Retrieved from http://www.zzee.com/solutions/unix-permissions.shtml Unix - User Administration. Retrieved from http://www.tutorialspoint.com/unix/unix-user-administration.htm File-System Interface. Retrieved from http://www.dia.unisa.it/professori/rescigno/SO/Silb_exerc/10-sol.pdf

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    This could happen for multiple reasons, the user could either have conflicting permissions or there could be multiple users manipulating the file. The user may have modify permissions in NTFS but the share folder permissions may be stricter, read-only; the most restrictive permissions takes precedence. For the user to be able to modify the file, the permissions should be loosened. The problem may also be that another user modified the file while our user had the file open, this would prevent the file to be modified. The user can save another copy of the file and re-write the original file…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?…

    • 766 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 1593 Words
    • 7 Pages

    With a umask value of 112, what are the default permissions assigned to newly created files?…

    • 1593 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ch05EOCAs

    • 2578 Words
    • 13 Pages

    A local user is stored in the __Security Account Manager (SAM)__ database of the computer on which it was created. P102…

    • 2578 Words
    • 13 Pages
    Satisfactory Essays
  • Good Essays

    It109 Final Review Paper

    • 792 Words
    • 4 Pages

    When copying a file from one NTFS volume to another, what happens to the files’ permissions? The permissions do not follow the new copy to the new location.…

    • 792 Words
    • 4 Pages
    Good Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    The GRANT clause of the GRANT command identifies the user who is granting a specific privilege.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Powerful Essays

    ____ 3. The NTFS ____ attribute protects folders and files so that only the user who encrypts the folder or file is able to read it.…

    • 1328 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    it 260 exam 1

    • 419 Words
    • 2 Pages

    Is the name of the local computer account that an IIS 7 Web Server uses by default to authenticate...…

    • 419 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Admins have access to all files, and other users have access to program files/windows only.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Study Guide

    • 2971 Words
    • 12 Pages

    Share permissions are typically found on a Share Permissions tab, and NTFS permissions are located on a Security tab. All Windows permission systems use the same interface, although the permissions themselves differ.…

    • 2971 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Beginner

    • 466 Words
    • 2 Pages

    5. Suppose that you have a file that is linked to a file owned by another user. How can you ensure that changes to the file are no…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    glossery

    • 6319 Words
    • 26 Pages

    Accounts Part of a business’s system of formal accounting records, containing details of transactions for specific items.…

    • 6319 Words
    • 26 Pages
    Good Essays

Related Topics