Preview

Unix File Protection

Good Essays
Open Document
Open Document
716 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unix File Protection
UNIX offers a file protection system that is straightforward and simple to use. However, many people are not aware of the value of this powerful mechanism. A secure environment is achieved not only by the operating system, but also through vigilant user and administrative practices. There are many schemes and mechanisms used in the UNIX operating system, as well as some simple tricks that are available to give the kind of file protection administrators want. For the purpose of this paper, a company with 5,000 employees, where 4,990 employees are allowed access to a specific file will be assessed.
When using Unix OS, as a bare minimum, the administrator needs to understand file-level security management at its most basic form. Failing to understand this could cause major problems later on. The key to file security on a UNIX system is to restrict file permissions as much as possible without keeping the system from doing what it needs to do, and without preventing access to a shared file. UNIX default protection needs to be enhanced to provide the proper level of protection that a company is look for in an operating system. The first front line protection involves using a unique user ID and password combination to restrict access to a system. Once a user has gained access to a system, further protection is needed to prevent unauthorized access or change to protected files. One way this can be done is by using the Access Control Lists (ACL’s), which an administrator can give individuals or groups varying levels of privileges. ACL lists users and their authorized access rights.
UNIX file permissions have three classes of users. The first is the user, which is the owner of the file or directory. They are also the creator of the file. The user is the one who can decide who has what rights, such as read or write to the file (make changes). Next there is the group class. These members belong to a group of users. Lastly, others are users who are neither the files owner,



References: Bishop, M. (n.d.). File Protection in UNIX. ucdavis.edu. Retrieved May 10, 2013, from http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CC4QFjAA&url=http%3A%2F%2Fnob.cs.ucdavis.edu%2Fbishop%2Fpapers%2F1987-decpro%2Ffilepro.ps&ei=gqORUZzGGem70gHX0oGICw&usg=AFQjCNFkWp7ekP675HOm2Y0er8g4-HKerg&bvm=bv.46471029,d.dmQ Using UNIX Permissions to Protect Files - Oracle Solaris Administration: Security Services. (n.d.). Oracle Documentation. Retrieved May 10, 2013, from http://docs.oracle.com/cd/E23824_01/html/821-1456/secfile-60.html

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unix is a multifunctional platform capable of handling several users accessing the same applications and files at once. It accomplishes this by setting up a permissions hierarchy and assigning users into groups. As multifunctional as it is, several problems still exist. For one, it has a command line interface. There is no graphical user interface. Second, privilege changes are made either one by one or all at once. Anything else would need to be scripted.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    ____ 3. The NTFS ____ attribute protects folders and files so that only the user who encrypts the folder or file is able to read it.…

    • 1328 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…

    • 302 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    NT1430 Linux Networking

    • 1121 Words
    • 5 Pages

    • & puts a process in the background while fg brings it to the foreground.…

    • 1121 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The pervasive adoption of the Linux operating system has led to a proliferation of new security tools and applications for ensuring the security of systems and applications. The intent of this analysis is to evaluate chroot jail, iptables and SELinux. These three security technologies are evaluated from the standpoint of which organizations were behind their development, in addition to an explanation of how each technology changes the Linux operating system to make it more secure. Finally the types of threats that each of the technologies is designed to eliminate is also discussed.…

    • 783 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    TOPIC GENERAL OVERVIEW OF THE SYSTEM BUFFER CACHE SYSTEM CALLS FOR FILE SYSTEM THE STRUCTURE OF PROCESSES PROCESS SCHEDULING AND MEMORY MANAGEMENT POLICIES…

    • 53108 Words
    • 213 Pages
    Powerful Essays
  • Good Essays

    Linux Commands

    • 5778 Words
    • 24 Pages

    All components of the path will be actual folder names - none will be symbolic links.…

    • 5778 Words
    • 24 Pages
    Good Essays