Preview

File Management

Good Essays
Open Document
Open Document
775 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File Management
File Management
Student’s name
POS/355
November 19, 2012
Instructor’s Name

File Management In a system that supports 5,000 users protection and accessibility are key roles for the system. On a system of 5,000 users allowing only 4,990 users to access one file must make good use of protection as well as accessibility. Protection of files needs to be set up so that there is access given to users on a system in three different permission categories. The first is the permission to read a file. The second is the permission to write or make changes to a file. The final is the permission to run or execute a file. A UNIX system sets up three classifications for its users; an owner or user, a group, and the other. First is the owner, which is the creator of a file, or the user at a specific time of a file. A group is a class to which the user or owner belongs. A group could be a department of a company or any other type of grouping with specific members. Last, the other is the general World Wide Web audience (“Unix Protection and Permissions”, n.d.). A review of how users are set up should be understood first and permissions can then be set. A UNIX system administrator sets up each user of the system to have a unique user name, whereas the UNIX operating system identifies users with a number, known as the user identifier or UID. Users are not limited to the humans that work on the system but the system functions are considered users as well (“Practical Unix & Internet Security”, n.d.). User names have a parameter of up to eight characters in length when created. A typical scheme would be the user’s first two initials of the first name and the full last name. In instances in which there were two users with the same name, such as two Marsha Grants, adding a number can create uniqueness, for example mg1grant. Even though the user names are a convenience for administration by humans, there is still a need for a user name to be unique. Group



References: Practical UNIX & Internet Security. (n.d.). Retrieved from http://www.diablotin.com/librairie/networking/puis/ch04_01.htm Unix Protection and Permissions. (n.d.). Retrieved from http://www.mtholyoke.edu/~easokolo/unix/perm.htm

You May Also Find These Documents Helpful

  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?…

    • 766 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®?…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lan operating systems

    • 404 Words
    • 2 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 404 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 1 Essay Example

    • 504 Words
    • 2 Pages

    4) What is the lowest level of permission you can enable for a user who must view the contents of a folder and its files? Why is this type of permission necessary?…

    • 504 Words
    • 2 Pages
    Good Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    The type of access controls and permissions that are probably configured are Modify , Read or Full control.…

    • 503 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    lab notes

    • 251 Words
    • 2 Pages

    User-based and groups or role-based controls are two types of access controls for Windows Server 2003 for folders and authentication.…

    • 251 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Access – On a computer you can control who gets access to the documents because you can just send it to certain people or if you have a password on the computer it restricts who can get on.…

    • 1465 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Mrs. Warren's Profession

    • 35851 Words
    • 144 Pages

    Any person using this document file, for any purpose, and in any way does so at his or her own…

    • 35851 Words
    • 144 Pages
    Powerful Essays

Related Topics