Preview

POS355 Week 2 File Management

Good Essays
Open Document
Open Document
491 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
POS355 Week 2 File Management
File Management

A system that supports 5000 users would use Access Control Lists (ACLs) to manage the file system in Unix, which would be adequate, but an alternative protection scheme may be more efficient for the system to allow access to all but 10 users. Traditional Unix systems use file access control to prevent unauthorized access to certain files and file directories. This type of protection works well for systems supporting small numbers of users and groups. For larger numbers of users and groups, access control lists are more effective.

Unix File Management

Traditional Access Control. Under the traditional Unix system, each user is identified by a user ID, which is a unique identification number assigned to each user. Along with user IDs, users are also designated to groups. Each group is then identified using a group ID. As files are created, they are designated “owned” by a particular user and a particular group. The group is normally the primary group of the files creator, but can be the group’s parent directory if the directory has the SetGID permission enable.
Each file is assigned a set of 12 protection bits. Nine of the protection bits assigned to a file are used to specify read, write, and execute permission for the owner, members of the group, and all other users. The other three bits are used to specify the file’s other behaviors. Two of the remaining bits are the SetUID and SetGID, and the final bit is known as the “Sticky” bit. The Sticky bit is no longer used, but was used to tell the system to keep a file in many after it is executed.
Unix also utilizes the “superuser” ID. Superuser is used to identify user that have access to all files. These users are exempt to all access control permissions. This means that they are allowed to read, write, execute, remove, and create files. This designation should not be granted to just any user, as it grants unrestricted system wide access.
Access Control Lists. For larger



References: Stallings, W. (2012). Operating Systems Internals and Design Principles (7th ed.). Retrieved from The University of Phoenix eBook Collection.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    Add the following attribute to Mikexxx & Suexxx (you need to find proper command parameters for the following attributes)…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 1593 Words
    • 7 Pages

    With a umask value of 112, what are the default permissions assigned to newly created files?…

    • 1593 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    vi. Each user and workforce member must ensure that their assigned User Identification is appropriately protected and only used for legitimate access to networks, systems, or applications. If a user or workforce members believes their user identification has been comprised, they must report that security incident to the appropriate Security Officer…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control list (ACL) A collection of access control entries that defines the access that all users and groups have to an object.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Ch05EOCAs

    • 2578 Words
    • 13 Pages

    When users log onto Active Directory, they receive a(n) _access token_ consisting of all of their security group memberships. P103…

    • 2578 Words
    • 13 Pages
    Satisfactory Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    The GRANT clause of the GRANT command identifies the user who is granting a specific privilege.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Reliable and accessibility is the largest challenge to managing data, text, and documents. If permissions are not set up properly then anyone ca n make changes to a document which can cause a problem for whom ever wishes to use the data. If there are several copies of the same file it to can cause…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…

    • 302 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    NT1430 Unit 1

    • 4876 Words
    • 18 Pages

    3. What are multiuser systems? Why are they successful? Multiuser systems allow any people to use all system resources almost simultaneously. Successful due to being cost effective, and having a level of security that allows Linux users to protect their data from access by other users through means of file access permissions, which limits users to what they can read, write to, or which file they can execute. Also implements ACLs (Access Control Lists) in which gives users and administrators finer-grained control over file access permissions.…

    • 4876 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays