Preview

File Management Requirements

Good Essays
Open Document
Open Document
678 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File Management Requirements
File Management Requirements
The following paper will discuss the Unix Operating System and how to implement a protection scheme that permits multiple users access to one file, with the exception of denying access to a particular group of users to the same file. Including the importance of protecting file sharing permissions to users.
Perhaps a business has a system that will support 5,000 users, however only 4,990 users are granted permissions to access one particular file. In order to grant access to 4,990 users, restricted authority is given. This will ensure that only the file needed is available to specific users and will help protect other data and system information from being accessed without permission. If restrictions are not implemented this could cause security issues, and breach of information, could diminish the integrity of the business. In some systems a security policy may be imposed to users whom have rights to access particular files, as well as specific classification to own those rights. (Low, Marie 1993)
UNIX file systems uses a protection scheme that provides sharing and protection of files. By using a protection scheme, owners of said file, manage the control over who will have access to modify, write, and read the files information. The owner may grant access to a group of users, otherwise defined as a subset of user, which will only allow the group of members to create subsets of operations, thus the owner can make changes as necessary. (Stallings, 2012)
If a user creates a file in UNIX, that file and permissions are owned by that particular user. In order to fully access a file, when a user wants to perform a task or operation on a file, the user needs to have read access, write access and execute access. In some instances, the owner may only give one of the accesses, which will limit what other users are allowed to do. Each user has an ID that is instantly compared to the owner’s attributes in order to determine if the asking user



References: Levine, Levine, Unix for Dummies, http://www.dummies.com/how-to/content/exploring- nfs-in-unix.html Low, Marie, ACM SIGOPS Operating Systems Review, ISSN 0163-5980, 01/1993, Volume 27, Issue 1, pp. 33 - 50 Stallings, W. (2012). Operating systems: Internals and design principles (7th ed.). Boston, MA: Prentice Hall.

You May Also Find These Documents Helpful

  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    8. In terms of permissions, what does 777 mean? Everyone can read write and execute…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The company that I work is need of a file system, one that can support 5000 users or more. This particular system was designed to allow multiple users to access the same file, in doing so there must be a way to protect the data that is being accessed by all of those users.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®?…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Pt2520 Unit 6

    • 1447 Words
    • 6 Pages

    It occurs when we can change the file structure without affecting the accessibility of the data.…

    • 1447 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unix is a multifunctional platform capable of handling several users accessing the same applications and files at once. It accomplishes this by setting up a permissions hierarchy and assigning users into groups. As multifunctional as it is, several problems still exist. For one, it has a command line interface. There is no graphical user interface. Second, privilege changes are made either one by one or all at once. Anything else would need to be scripted.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    5. [3] Ten processes share a critical section implemented by using a semaphore x. Nine…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    Samba is used for the file server and has many features to restrict access to what is shared. This includes enforcing password requirements, filtering at the network level, and a check going against group memberships (Jang, 2011).…

    • 295 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Reliable and accessibility is the largest challenge to managing data, text, and documents. If permissions are not set up properly then anyone ca n make changes to a document which can cause a problem for whom ever wishes to use the data. If there are several copies of the same file it to can cause…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…

    • 302 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    NT1430 Unit 1

    • 4876 Words
    • 18 Pages

    3. What are multiuser systems? Why are they successful? Multiuser systems allow any people to use all system resources almost simultaneously. Successful due to being cost effective, and having a level of security that allows Linux users to protect their data from access by other users through means of file access permissions, which limits users to what they can read, write to, or which file they can execute. Also implements ACLs (Access Control Lists) in which gives users and administrators finer-grained control over file access permissions.…

    • 4876 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    final exam

    • 1020 Words
    • 5 Pages

    TCO (6) The Extended two-file system in Fedora Core 4 provides ____ to keep files safe from intruders who might gain unauthorized physical access to sensitive, stored data.…

    • 1020 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays

Related Topics