Preview

Pos-335 Individual Assignment File Management Paper

Good Essays
Open Document
Open Document
732 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pos-335 Individual Assignment File Management Paper
Introduction

The task of implementing a protection scheme that will provide controlled access to specific files in a system is not only an important but also a necessary task to ensure that the integrity as well as the availability of that file is maintained throughout. This paper is designed to put into perspective a protection scheme to facilitate the scenario where a system has 5000 user and 4990 of those users will need to have access to a particular file within the system. It will also provide clarity on Access control list (ACL’s) their roles as well as the different flavors available. It will also try to prove that proper implementation and utilizations of groups within a security scheme provides not only organization and structure but also control over massive amounts of users in a central location. It will also show that alternate file protection scheme AFS ACL Permissions if implemented correctly can outweigh the traditional permission settings provided by UNIX.
Access Control Lists (ACLs)

One way to accomplish this task would be to create an access control list and assigning users to one of two groups. An access control list (ACL) is used to list permissions attached to a directory and the object within that directory. An ACL outlines which users, groups or system processes are allowed access to an objects and what operations are allowed on those objects and in what circumstances. With an ACL there are a list on seven permissions that can be set on an object, (lookup, insert, delete, administer, read, write, lock) versus the three available on UNIX (read, write and execute).
There are two main types of Access Control Lists; access ACLs and default ACLs. The access ACL are file or directory specific whereas the default ACL is associated only with directories. If an access ACL is not active on a file within a directory the file conforms to the rule assigned by the default ACL for that directory. Configuration of access control list can be can be

You May Also Find These Documents Helpful

  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    List Folder/Read Data, Read Attributes, Read Extended Attributes, Create Files/Write Data, Create Folders/Append Data, Write Attributes, Write Extended Attributes, Read Permissions,…

    • 766 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    access control list (ACL) A collection of access control entries that defines the access that all users and groups have to an object.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    2. An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Reliable and accessibility is the largest challenge to managing data, text, and documents. If permissions are not set up properly then anyone ca n make changes to a document which can cause a problem for whom ever wishes to use the data. If there are several copies of the same file it to can cause…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    You Decide week 5

    • 831 Words
    • 3 Pages

    Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;…

    • 831 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Epic is privately held health care software company. In 1979, it was established by Judith Faulkner. The organization central command was in Madison, Wisconsin, yet in 2005 the organization moved to Vernon, Wisconsin. The product 's business is health awareness associations, and it is a fascinating suite of human services programming fixated on a MUMPS database. (Massachusetts General Hospital Utility Multiple Programming System). It is a programming dialect that was made in the 1960 and afterward utilized for the health awareness associations.…

    • 799 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Identify one kind of human services organization—for example, mental health provider or foster care provider—and describe the services provided.…

    • 1051 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    Access Control Lists are used by OS’s such as Windows and UNIX. An ACL is a table that informs the OS of each users access rights to an object within the system, the object could be a program, a single file or a folder. Although ACL’s do the same task in a similar way, the different OS’s each have a different way of carrying it out.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Unix File

    • 566 Words
    • 3 Pages

    With this understanding of file permissions, groups can be created to limit access based on who is in the group. The command groupadd access will create a group with the name access. Users can then be added to the access group with the useradd command. Once a group is created the group class of a file’s permission can be changed with the chgrp command. To change the group class to…

    • 566 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    References: techNet. (2005, January 21). Access control in Active Directory. Retrieved from Microsoft TechNet: http://technet.microsoft.com/en-us/library/cc785913(v=ws.10).aspx…

    • 431 Words
    • 2 Pages
    Satisfactory Essays