Preview

File Management

Good Essays
Open Document
Open Document
572 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File Management
File Management
Amanda Dyer
POS/355
September 4, 2014
August Smith

File Management
File management in any computer system is a very crucial function. Proper file management alleviates everyday issues in file protection, to allow a smooth experience for users. Using file protection for operating systems, such as Unix, can be very easy and simple. Unix is a multiuser operating system that is used on a wide range of machines from powerful microcomputers to supercomputers (Stallings, 2012). In Unix, permissions are configured to allow owner(s) to define different permissions of files by restricting or permitting access where needed. These permissions are set to categories of owner, group, and other permissions. In early versions of file control and access for Unix, users where assigned a user identification number. These users also were members of groups and a group identification number identified each group. Now when a file is created by a user, not only is the file owned by a specific owner, but by the owners primary group as well. Attached to files are protection bits, where read, write, and execute permissions are specified and carried down to other users of the group/groups the owner belongs to. Anyone can see the issue that lies in this type of file access control. What happens when the owner desires only specific users or no users at all to have access to the created file?
Several modern Unix-based operating systems are supporting protection schemes called Access Control Lists or ACLs. Unix-based systems include big named operating systems such as, Linux, FreeBSD, and Solaris. Implementing this type of protection scheme provides controlled access to certain files, guaranteeing the availability and integrity of the files is always maintained. Suppose your company had an organization that supports 5000 users. Your company had a file that 10 users of the company were not allowed access to the file. What



References: Stallings, W. (2011). Operating Systems: Internals and Design Principles(7th ed.). New Jersey: Prentice Hall Rhodes, T. (Ed.). (n.d.). 14.9. Access Control Lists. Retrieved from https://www.freebsd.org/doc/handbook/fs-acl.html

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    DACL is a list of Access Control Entries (ACE) that store the information about which user(s) has access to a secure object, such as a file.…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control list (ACL) A collection of access control entries that defines the access that all users and groups have to an object.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    2. An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    You Decide week 5

    • 831 Words
    • 3 Pages

    Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;…

    • 831 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…

    • 302 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Files

    • 1706 Words
    • 7 Pages

    In the history of hockey Gordie Howe was not only one of the greatest players to ever hit the ice he was literally a game changer. On and off the ice it was easy to tell from his early playing days in the USHL that Gordie was special. Gordie Howe possessed skills never seen by any hockey player before and rarely seen since. Howe would very quickly evolve, later being signed by the NHL’s Detroit Red Wings in 1946. Over the next 33 years Gordie Howe was in the game of pro hockey (NHL or WHA). He set numerous records over the years such as most goals ever scored in NHL history at 801 (since surpassed by Wayne Gretzky) and most NHL games ever played. Gordie Howe’s impact on the games will be remembered forever. For being able to change the way hockey was played Gordie Howe was able to evolve and shape the game of hockey over the 33 years in which he played is how Gordie Howe has contributed to the shaping of Canada’s identity.…

    • 1706 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Linux vs Windows vs Mac

    • 1355 Words
    • 6 Pages

    Operating systems are the link between the user and the applications and the hardware. They are responsible for deciding how the user commands will be interpreted and how the operating system itself will carry the process. There are several different types of operating and each carries out processing in their own way. Windows, UNIX/Linux and Mac are some of the most popular and widely used operating systems.…

    • 1355 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Most computers are used for data processing, as a big growth area in the “information age”…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Image Management

    • 581 Words
    • 3 Pages

    The world around us is changing and changing at a faster pace than we realize!! The importance of Image management cannot be overlooked….…

    • 581 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Files

    • 477 Words
    • 2 Pages

    Investing in common stocks can be compared to gambling. Commit the capital in a stock that becomes insolvent will lose the investment or invest in a stock price, which increases by a hundred percent in a one-year period. Over long periods of time, investments in a diversified portfolio of common stocks have earned positive returns, whereas long-term venture results in negative returns. This study aims to provide an understanding what the risks of investing in common stocks are and knowing the ways to reduce it helps in managing investments to earn positive returns. In essence, the objectives, personal characteristics, and time frame outline the level of risk an investor can absorb, which then determines the choice of investments to make.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Files

    • 399 Words
    • 2 Pages

    Local government in Angeles City, Pampanga, my hometown, has been ruled under the political dynasties of the Lazatin’s and Nepomuceno’s for the past several decades. According to my parents and yaya (a retired teacher of a local public school here in Angeles), the Nepomuceno’s are known throughout the whole Angeles city to be one of the wealthiest (if not the wealthiest) families in Angeles. They own and have monopolized our local ice plant, electric power plant, and multiple institutions including the largest university in Angeles, one private high school, 2 subdivisions and 1 cemetery. Plenty of these are not only high-earning enterprises already in nature but their properties are also the ones that comprise of the high-end services in Angeles. I myself have just discovered that my family and I have been living in a house, for 17 years (renting), owned by the Nepomucenos – inside their subdivision as well. Not only do they dominate the private sector but also the local government sector as well and have held about 20 positions (mostly mayors) in the past 5 decades, which were taken by Nepomucenos.…

    • 399 Words
    • 2 Pages
    Good Essays