Preview

File Management

Satisfactory Essays
Open Document
Open Document
463 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File Management
File Management Paper

POS 355
Jan 30, 2014

File Management Paper
Introduction
In this paper, we will discuss how to specify a file protection scheme in UNIX. File management is a critical function in any computer system. From file creation to file protection, proper file management can alleviate common issues allowing a smoother user experience.
Background
UNIX has a very distinct file system. While the file directory system is similar to Windows, the users Graphical Users Interface (GUI) is not. UNIX utilizes a command line prompt where Windows provides an actual GUI to interact inside the file system. The standard double-click icon will not pertain to this paper. UNIX users are primarily system developers, programmers, and administrators. A common computer user, such as my workplace, primarily executes operations in a Windows based environment.
Protection Scheme Traditional In traditional UNIX, “each UNIX user is assigned a unique user identification number (user ID)” (Stallings, 2012) or UID. When a user creates a file, his or her UID is attached to that file and designated as the owner. The user is also a member of a primary group as well as other groups. Allowing 4990 users access to this single file would require a users UID to be a member of either the creator’s primary group or in the group of the file’s parent directory with the proper SetGID permission set. In protecting this file, Bishop states “there are twelve permission bits in the protection word of a file; they customarily divided into groups of three (Bishop, 1987).” The bits represent the encoded permissions for the file’s owner and details how the file protection scheme is set.
Modern
More up to date UNIX and UNIX operating systems such as FreeBSD, OpenBSD, Linux, and Solaris use an access control list for permission setting and file protection. Stallings states “the administrator assigns a list of UNIX user IDs and groups to a file by using the setfac1 command.



References: Bishop, M. (1987). File Protection in UNIX. Retrieved from http://nob.cs.ucdavis.edu/bishop/papers/1987-decpro/filepro.pdf Stallings, W. (2012). Operating Systems: Internals and Design Principles (7th ed.). Boston, MA: Prentice Hall.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The company that I work is need of a file system, one that can support 5000 users or more. This particular system was designed to allow multiple users to access the same file, in doing so there must be a way to protect the data that is being accessed by all of those users.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®?…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In this report I will briefly explain about the features and functions of different operating systems. I have chosen to compare windows 7 Mac OS.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT1430 Chapter 6 labs

    • 297 Words
    • 3 Pages

    You should become comfortable using the Linux command line and the online help utilities to manage files and directories.…

    • 297 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Quiz 5

    • 507 Words
    • 9 Pages

    When assigning permissions, it is best to assign them to ____________ rather than to individual…

    • 507 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    Unix is a multifunctional platform capable of handling several users accessing the same applications and files at once. It accomplishes this by setting up a permissions hierarchy and assigning users into groups. As multifunctional as it is, several problems still exist. For one, it has a command line interface. There is no graphical user interface. Second, privilege changes are made either one by one or all at once. Anything else would need to be scripted.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Better Essays

    "Admin Tools - User 's Guide :: Fixing the permissions of files and directories." Admin Tools - User 's Guide :: Fixing the permissions of files and directories. https://www.akeebabackup.com/documentation/admin-tools/fixing-permissions.html (accessed January 14, 2014).…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Lab 1 Essay Example

    • 504 Words
    • 2 Pages

    4) What is the lowest level of permission you can enable for a user who must view the contents of a folder and its files? Why is this type of permission necessary?…

    • 504 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Admins have access to all files, and other users have access to program files/windows only.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?…

    • 503 Words
    • 2 Pages
    Good Essays
  • Good Essays

    File access is very important for any organization. The organization has to make sure that the proper personnel are given access to the files that they need to work on or need to get information they need. Even more important than to give the right personnel access, keeping unauthorized users from entering the files is more important. In this paper, the scenario of a system that supports 5,000 users and only 4,990 of said users would have access to one file will be use. The question to be answered is of how to specify this protection scheme in UNIX. It is very important to set up a protection scheme that will allow control access and viewing privileges of specific files to a number of different users. It is also a necessary task to ensure the integrity of…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    microsoft notes

    • 1216 Words
    • 5 Pages

    When assigning NTFS permissions an ACE entry can explicitly define who is denied access to a resource, True or False?…

    • 1216 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    Access Control Lists are used by OS’s such as Windows and UNIX. An ACL is a table that informs the OS of each users access rights to an object within the system, the object could be a program, a single file or a folder. Although ACL’s do the same task in a similar way, the different OS’s each have a different way of carrying it out.…

    • 3039 Words
    • 13 Pages
    Powerful Essays