Preview

John Tucker File Managment Paper

Satisfactory Essays
Open Document
Open Document
472 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
John Tucker File Managment Paper
File Management Paper
John Tucker
March 17, 2015
POS/355
Corey Johnson

File Management

Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®?
There are multiple ways that you can achieve this protection scheme. The first way that you would be able to do it is to go inside the operating system and create an access control list. This access control list will list on the 4,990 members that you want to have access the specific file. You can also put the 4,990 users that you want to be able to access the file in one group by themselves. Unfortunately this method might not always be available to you.
In order for us to be able to create this protection scheme we will have to use a system that allows us to have 5,000 users using it at once. We will use an enterprise server since this type of server is specifically for use in environments with many different users. Unlike the server you probably have for your home computer which is only built to serve your households needs. We will be working inside of the UNIX system which has different options as far as protection schemes go. This specific operating system handles its files and directories the same way. All of the directories are part of sub directories. Thee files that are in these directories are only able to be accessed by users who are associated with that specific group.
When we take a look at the access control list some users have a R by their name which means that they are able to only read the file that they are associated with. Some users with have a W which means that they will be able to actually write and make changes to the file. Some users will have a X which means that they can execute the file. In order to add users to a group a manager, or the company 's system administrator would have to go in and assign individual users to each group.



References: Codex. ((n.d.)). Retrieved from http://codex.cs.yale.edu/avi/os-book/OS8/os8c/practice-exer-dir/10-web.pdf Stallings, W. ((2015)). Operating Systems: Internal and Design Principles, 8e. Retrieved from The University of Phoenix eBook Collection Database.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Jennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20 percent while the warehouse-shipping rate increased by 10 percent, and the overall profit has increased by a modest amount of 0.005 percent for the first reporting period.…

    • 1078 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?…

    • 766 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    The next feature that I will suggest to Richman Investment would be Access control. Access control restricts access to network resources and would require the user to have privileges to the resources. This would go hand and hand with the first feature that I suggested. You will need this for the first feature that I picked to give the users proper permissions to resources and this will help keep users out that should not have access to the resource.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The company that I work is need of a file system, one that can support 5000 users or more. This particular system was designed to allow multiple users to access the same file, in doing so there must be a way to protect the data that is being accessed by all of those users.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    On February 27, 1992, In Albuquerque, New Mexico, Stella Liebeck and her grandson went to the local McDonalds to get breakfast. The grandson Chis was driving his 1989 Ford Probe with his grandmother Stella sitting in the passenger seat. Chris's car did not have cup holders so Stella had to put the cup of coffee in between her knees in order to add cream and sugar. During this process, Stella spilled the entire cup of coffee on her lap. Stella received third-degree burns to her groin, buttocks and thighs resulting from the scalding coffee. Stella was taken to the hospital where she stayed for over a week and underwent skin graphing treat the burns. Worst of all, as if suffering third-degree burns wasn't enough, Stella was partially disabled…

    • 1016 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    ____ 3. The NTFS ____ attribute protects folders and files so that only the user who encrypts the folder or file is able to read it.…

    • 1328 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    This will allow access only to those doing the accounting for the company. The company also needs to have written policies. Written policies will outline rules and regulations regarding the security of information. Written policies will also explain how to keep information secure and what to do if there is a security breach. Included in the policies should be consequences of not following the rules and regulations. The company needs to have backup procedures in case the system crashes. The system should be set to back up every other day or everyday to ensure not to lose too much information. To better protect confidential information from intrusion, the company should have some firewall protection. A firewall “guards against unauthorized access to sensitive file information from external internet users. On networked systems, firewalls are often standalone devices with built-in, protective software” (Bagranoff, Simkin & Strand, 2008, pg. 39). The company should also invest in anti-spyware and anti-virus protection to protect the system from any viruses. Following the above suggestions will help minimize any threats to the company’s current system.…

    • 1170 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    Samba is used for the file server and has many features to restrict access to what is shared. This includes enforcing password requirements, filtering at the network level, and a check going against group memberships (Jang, 2011).…

    • 295 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Lesson 2

    • 959 Words
    • 4 Pages

    6. The combination of permissions assigned to a file, plus the permissions inherited from parent folders and group memberships, is called the file’s effective permissions.…

    • 959 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Proper management of user accounts will ensure the information and access to devices on the network confidential.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Children

    • 7355 Words
    • 30 Pages

    3. What legal instructions do child care workers need to be aware of an able to work with?…

    • 7355 Words
    • 30 Pages
    Good Essays