Preview

POSS 355 Week 1 Assignment 1: File Sharing

Good Essays
Open Document
Open Document
689 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
POSS 355 Week 1 Assignment 1: File Sharing
File System Sharing

POS/355

December 2, 2013

The company that I work is need of a file system, one that can support 5000 users or more. This particular system was designed to allow multiple users to access the same file, in doing so there must be a way to protect the data that is being accessed by all of those users.
We already know that the storage device will have to be nonvolatile, keeping the data intact through power outages or reboots to the system. There should be a backup of all the data on a secondary storage device in the event that the primary storage device fails. Since most of the employees will have be able to access the same files on this system, file locks need to be implemented.
…show more content…
It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.
Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.
It is my belief that with these precautions in place as well as adequate storage we can develop a file system that meets all of our requirements. Projects can be worked on offsite. The unique feature about using UNIX is that files can be updated or modified in real time allowing members to access those changes. Simply put file sharing allows us to be flexible and work more

You May Also Find These Documents Helpful

  • Good Essays

    CMGT/430 Week 4

    • 622 Words
    • 3 Pages

    As a consultant for the company, I would recommend they invest in Universal File Access (UFA). UFA, developed by NTP Software, is technology that integrates with common storage hosts, cloud, and object stores to make an organization’s file data available to end users on any device consistent with its active directory security and other policies. What separates it from consumer-oriented “sync and share” products is that UFA is an end-to-end enterprise solution that provides corporate end users the ability to create and interact safely and securely with an organization’s file data using any…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    5. Defining will have to be documented whenever anyone needs a change. Levels of access can be done through the administrator for object level changes by setting different levels of permissions such as read-write-full access or no access.…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    employees. It will also save storage data since it will help eliminate file and data…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Mis 535 Course Paper

    • 2829 Words
    • 12 Pages

    The world is changing daily and many companies are looking to develop ways to save on production and hardware. The idea of having a system that allows a company to store files away from the main server will help a company to store more and free space on the main server. As companies are using more and more technology, the hardware (servers and website space) and Infrastructure is having problems with available space to help free up hard drives and server space. Many computer owners have issues with trying to find a place to store files and other media. The idea is to allow one to place a file in a central location away from the main computer, or cloud storage.…

    • 2829 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Pm3110 Lesson 4

    • 513 Words
    • 3 Pages

    A ____, used in RAID Level 2, is a coding scheme that adds extra, redundant bits to the data and is therefore able to correct single-bit errors and detect double-bit errors.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Task B 307

    • 338 Words
    • 1 Page

    To ensure security you would have you computer network encrypted, and multiple passwords for computers you should never use the same password they should always be different, when using filing cupboards you would should have locks on them and different locks with different keys for each cupboard..…

    • 338 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Explore and Discuss

    • 1383 Words
    • 6 Pages

    A.3. Please note that /root is root user’s home directory, which is not same as /.…

    • 1383 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    By performing the actions required to facilitate this network, many users now have trusted access to certain files and documents within their team or company, so they may work together and the managers and executives can keep track of the work as…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The review of the current information technology security policy was conducted based on the idea of improvement with respect to current technology trends and best practices. An evaluation of the enterprise infrastructure as a whole, as it pertains to information technology security, was also conducted. These evaluations were the starting point for Smith Systems Consulting to design a security strategy to best fit Riordan Manufacturing. The existing security policy consists of location-based data access to on-site servers and on-site access to Unix servers for ERP and MRP systems. Also, it was evident that there are a number of servers and data to be accessed from different operating systems that are deployed throughout the locations. The management of the existing security strategy is one that requires each individual to be assigned access permissions manually throughout their term of employment. This strategy is commonplace in the industry, but requires the IT staff to manage each user individually. Therefore, our results of the evaluation were positive with respect to overall security, but management of the user access is costly and time consuming. With these results in mind, we propose a security policy base on Role Based Access Controls (RBAC).…

    • 892 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Quick Check

    • 747 Words
    • 3 Pages

    10. A new company will have 30 workstations in one building sharing a single network. All users must be able to share files and printers with each other. Access to shared information must be secure and simple to administer. The best technology for this system is:…

    • 747 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unix File Protection

    • 716 Words
    • 3 Pages

    UNIX file permissions have three classes of users. The first is the user, which is the owner of the file or directory. They are also the creator of the file. The user is the one who can decide who has what rights, such as read or write to the file (make changes). Next there is the group class. These members belong to a group of users. Lastly, others are users who are neither the files owner,…

    • 716 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Beginner

    • 466 Words
    • 2 Pages

    5. Suppose that you have a file that is linked to a file owned by another user. How can you ensure that changes to the file are no…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Disaster Plan

    • 1162 Words
    • 3 Pages

    The way in which XYZ Computers has their IST Department set up currently is susceptible to many threats. The lack of a firewall is an open invitation for data to be stolen by prying eyes, and the vulnerability of placing the payroll database is in the same server as the email service. The geographic and weather conditions of the location of the company have a high risk of flooding, yet the Servers were installed on the first floor. Lastly, the backup method in place is sort of outdated and there is no mention on how often the backup takes place; additionally, the backup tapes themselves could be damaged, lost, or stolen. These recommendations are an attempt to improve XYZ Computer’s network data security, prevention of data loss, protection against network failure, and contingencies for natural disasters.…

    • 1162 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Data Recovery

    • 15337 Words
    • 62 Pages

    FOREWORD ---------------------------------------------------------------------------------------------------------------------The core of information age is the information technology, while the core of the information technology consists in the information process and storage. Along with the rapid development of the information and the popularization of the personal computer, people find information more and more useful and need it ever more than the past. Owning to the massive data, there is a huge challenge to the data storage technology. So how to save so many documents and how to visit document as fast as possible become the key point. We know we need storage devices to save data, while there are so many kinds of storage devices and modes to save data. What’s more, when saving the data and information, it is more important to ensure the storage security as well as the accuracy, usability, reliability of data. Often, what is invaluable is that invisible data. CONTENTS ---------------------------------------------------------------------------------------------------------------------Ⅰ.Elementary knowledge of data recovery..................................................................................3 1.Connotation of data................................................................................................................3 2.The essence of data recovery .................................................................................................3 3.The scope of data recovery ....................................................................................................3 4.The principle of data recovery ...............................................................................................4 Ⅱ.Data loss…

    • 15337 Words
    • 62 Pages
    Powerful Essays

Related Topics