Preview

File Management

Satisfactory Essays
Open Document
Open Document
372 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File Management
Option 1- File Access The first version of UNIX had a file access scheme where the users where assigned a UID known as a user identification number. The user was also apart many groups but had a main group. The groups where identified by a group id, so as files were created they were assigned to a user that had that particular id attached to the user.

The file is also put in a specific group; this would be the creator where it originated or the parent directory. Within the file it has something called protection bits and 9 of the bites have the permission read, write and execute. These permissions are for the owner of that particular file. When assigned to the directory the bits will be able to rename, delete or re-create files, this really helps to manage files that are in a shared directory.

Lastly, the access control scheme is really a simple protection for the domain structure. The domain is linked with the user and if anything is changed the user’s id will be affected.

Option 1- File Access Within UNIX there are two ways to allow users access to one file. First and for most you would need to create a list called and access control list with all 4990 users on it. Then add the 4990 users in a group giving the group access as they need it. You have to keep in mind that the scheme is not implemented since each group (s) can be restricted by the system.

Next would be giving all users universal access to the files, now if their name shows up on the access control list and has different permission then they will not have the access. Basically by doing using this scheme, you can put the remaining users (10) on the control list but you would not give them access privileges like the 4990 users have.

Instead of an access lists that coincide with each file, it would be better to have a user control list that is associated

You May Also Find These Documents Helpful

  • Good Essays

    • Editor - user/users group with access rights to change database data documents; user/users group with access rights to change…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 1593 Words
    • 7 Pages

    With a umask value of 112, what are the default permissions assigned to newly created files?…

    • 1593 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    The company that I work is need of a file system, one that can support 5000 users or more. This particular system was designed to allow multiple users to access the same file, in doing so there must be a way to protect the data that is being accessed by all of those users.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    Is the process of determining if an authenticated user has access to the resources they requested. Is finding out if the person, once identified is permitted to manipulate specific resources. This is usually determined by finding out if that person is of a particular role that has access to the resources. Authorization is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    ____ 3. The NTFS ____ attribute protects folders and files so that only the user who encrypts the folder or file is able to read it.…

    • 1328 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    Samba is used for the file server and has many features to restrict access to what is shared. This includes enforcing password requirements, filtering at the network level, and a check going against group memberships (Jang, 2011).…

    • 295 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Resume

    • 1027 Words
    • 5 Pages

    * Hands on experience in implementing security and sharing rules at object, field, and record level for different users at different levels of organization. Also created various profiles and configured the permissions based on the organizational hierarchy…

    • 1027 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Companies need a strong architecture to protect user data. It is essential to have access control lists (ACL) on all network devices to avoid data breaches by cyber criminals.…

    • 986 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Smart Card Access Control

    • 3570 Words
    • 15 Pages

    In this assignment, the newest established bank has employed me as one of their colleague to be the Project Manager of IT Department of Yale Bank. As the Yale Bank has been growing commercially, they need to address the increasing number of employees by automating the access control of each department to protect their company’s interest. Only selected number of employees that has the valid credentials can enter or have access to a certain offices and electronic files that can be accessed through various system tools.…

    • 3570 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Sample Feasibility Study

    • 1065 Words
    • 5 Pages

    Since the proposed solution is a web based solution, Security and control are provided through definable role-based…

    • 1065 Words
    • 5 Pages
    Powerful Essays