Preview

Pos 355 File Management Paper

Good Essays
Open Document
Open Document
699 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pos 355 File Management Paper
File Management Paper
Student
POS 355
Date
Teacher

File Management Paper
File access is very important for any organization. The organization has to make sure that the proper personnel are given access to the files that they need to work on or need to get information they need. Even more important than to give the right personnel access, keeping unauthorized users from entering the files is more important. In this paper, the scenario of a system that supports 5,000 users and only 4,990 of said users would have access to one file will be use. The question to be answered is of how to specify this protection scheme in UNIX. It is very important to set up a protection scheme that will allow control access and viewing privileges of specific files to a number of different users. It is also a necessary task to ensure the integrity of
…show more content…
The UNIX files types are regular or ordinary, directory, special, named pipes, links, and symbolic links.
“Note that the permissions that apply to a directory are distinct from those that apply to any file or directory it contains. The fact that a user has the right to write to the directory does not give the user the right to write to a file in that directory. That is governed by the permissions of the specific file. The user would, however, have the right to rename the file,(Stallings, 2012).”
File access is very important for any organization. The organization has to make sure that the proper personnel are given access to the files that they need to work on or need to get information they need. Even more important than to give the right personnel access, keeping unauthorized users from entering the files is more important. For the scenario of a system that supports 5,000 users and only 4,990 of said users would have access to one file, UNIX was used. Each user would have a masked entry that will specified if the user is allow to do anything to the

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    This could happen for multiple reasons, the user could either have conflicting permissions or there could be multiple users manipulating the file. The user may have modify permissions in NTFS but the share folder permissions may be stricter, read-only; the most restrictive permissions takes precedence. For the user to be able to modify the file, the permissions should be loosened. The problem may also be that another user modified the file while our user had the file open, this would prevent the file to be modified. The user can save another copy of the file and re-write the original file…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®?…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unix is a multifunctional platform capable of handling several users accessing the same applications and files at once. It accomplishes this by setting up a permissions hierarchy and assigning users into groups. As multifunctional as it is, several problems still exist. For one, it has a command line interface. There is no graphical user interface. Second, privilege changes are made either one by one or all at once. Anything else would need to be scripted.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may consist of diverse components that collaborate to ensure the main objective is achieved. An effective control system would ensure privileges for the different users vary according to their access rights or levels; the system under research can monitor and record all activities of access, lock and unlock the doors, cancel privileges when a pass card is lost as well as detect usage of canceled cards (Benantar, 2006).…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…

    • 302 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    4. (TCO 1) Folders and files can be _____ so that only the designated user can view the contents, adding yet another level of security. (Points : 5)…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    With the increase in human population, digital information is also increasing exponentially. In 2007, 97 percent of assessment showed that approximately 93 percent of information was stored digitally as opposed to less than 1% in 1986. With the amount of information stored digitally, there is an increasing need to share and allow access to the appropriate individuals [1]. As user populations of information system have expanded, the challenge of controlling access to resources using security policies has grown. Access Control is the process for proving authority to access the specific resources, applications and system.…

    • 1572 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Locking the authorization level assist in keeping the server safe. Setting wrong permissions on the files present in the server may lead to data leaking. To avoid access to outside users into the server usage of open permissions must be avoided by locking the permission levels.…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    b) Write a program in C to check whether a given system is ANSI C complaint or…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    distributed system

    • 2436 Words
    • 10 Pages

    Access Transparency: Clients should be unaware of the distribution of the files. The files could be present on a totally different set of servers which are physically distant apart and a single set of operations should be provided to access these remote as well as the local files. Applications written for the local file should be able to be executed even for the remote files. The examples illustrating this property are the File system in Network File System (NFS), SQL queries, and Navigation of the web.…

    • 2436 Words
    • 10 Pages
    Good Essays

Related Topics