Preview

POS 355 Unix File Management

Good Essays
Open Document
Open Document
680 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
POS 355 Unix File Management
Unix File Protections

ABSTRACT

Unix is a multifunctional platform capable of handling several users accessing the same applications and files at once. It accomplishes this by setting up a permissions hierarchy and assigning users into groups. As multifunctional as it is, several problems still exist. For one, it has a command line interface. There is no graphical user interface. Second, privilege changes are made either one by one or all at once. Anything else would need to be scripted.

Programmers originally built the Unix operating system for other programmers to use. It is an extensible operating system, meaning it allows programmers to extend and change it to do anything they need it to. Essentially, it is built to multitask. It allows multiple users to use the same app or multiple users access to the same file. Although the computer cannot process all the requests at once, it does prioritize the requests to keep things orderly. If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.



Cited: Stallings, W. (2012). Operating Systems: Internals and Design Principles (7th ed.). New York, New York: Prentice Hall.

You May Also Find These Documents Helpful

  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    It gives the person access using the sudo access, superuser capability and allows them to run programs with the…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®?…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    11 What determines which areas of the program a particular user can access, and whether that user can only view data or has rights to enter or edit data?…

    • 484 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Sharing allows several processes to access the same portion of main memory (Stallings, 2012). When there are a number of processes executing the same program it is beneficial to allow each process to access the same copy of the program rather than have its own separate copy (Stallings, 2012,). The memory management system must therefore…

    • 573 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Multiuser operating systems allow the multiple users to access the resources of single systems at a time or at different time. It allows many users to take advantage of the computer's resources simultaneously. Some permit 100's to 1000 users to take advantage of the computer's resources simultaneously. They are successful because of the powerful, efficient, stable and secure operating systems like LINUX. It has a capability of providing each user the same data ensuring total privacy from each user even while accessed by 100's of users simultaneously.…

    • 1455 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    11. Unencrypted files that are moved or copied to a folder with the encryption attribute set are always encrypted; by default encrypted files can be opened only by the user account that encrypted the file…

    • 250 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    NT1430 Unit 1

    • 4876 Words
    • 18 Pages

    3. What are multiuser systems? Why are they successful? Multiuser systems allow any people to use all system resources almost simultaneously. Successful due to being cost effective, and having a level of security that allows Linux users to protect their data from access by other users through means of file access permissions, which limits users to what they can read, write to, or which file they can execute. Also implements ACLs (Access Control Lists) in which gives users and administrators finer-grained control over file access permissions.…

    • 4876 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    File access is very important for any organization. The organization has to make sure that the proper personnel are given access to the files that they need to work on or need to get information they need. Even more important than to give the right personnel access, keeping unauthorized users from entering the files is more important. For the scenario of a system that supports 5,000 users and only 4,990 of said users would have access to one file, UNIX was used. Each user would have a masked entry that will specified if the user is allow to do anything to the…

    • 699 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    For each of everyone have their specific authorization of using this system. Example like admin have the authorization of changing or update the system database and staff have an authorization of input data and receive an output form the system. We have authorization levels because they are some people have authorization to enter further in the system.…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Netw250

    • 2162 Words
    • 9 Pages

    UNIX is characterized as a multiuser, multitasking, stable, reliable, and portable OS. UNIX was developed at AT&T Bell Labs in 1969. Two programmers, Dennis Ritchie and Ken Thompson, had returned to Bell Labs after being loaded on a project named Multics with programmers from MIT and GE. The Multics project (1965–1969) was an attempt to write a dependable timesharing system in the days of batch processing on large mainframe computers. Bell Labs withdrew from the Multics project in 1969.…

    • 2162 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    lab notes

    • 251 Words
    • 2 Pages

    User-based and groups or role-based controls are two types of access controls for Windows Server 2003 for folders and authentication.…

    • 251 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    By creating groups you can get people access to the information that they need to get to. When a user is created and added to a group that user then has the access permissions of the group that has been made.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    With the users assigned to group accounts or OU’s, you can use to assign a set of permissions and rights to multiple users simultaneously, along with making any changes that are needed to individual users. Computer accounts provide a means for authenticating and auditing computer access to the network and to domain resources. Each computer account must be unique.…

    • 431 Words
    • 2 Pages
    Satisfactory Essays