Top-Rated Free Essay
Preview

Protection Scheme in UNIX

Satisfactory Essays
354 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Protection Scheme in UNIX
Running head: Protection Scheme in UNIX®
Richard Cooper
POS/355 - INTRODUCTION TO OPERATING SYSTEMS
5/21/15
Instructor: ANTHONY ISOM
Protection Scheme in UNIX®
As there is a requirement to support 5,000 users within an organization, there are certain ways in which access to a particular file can allow access to 4,990 users in total. Within UNIX, file access is maintained through the file system and structure that is maintained below the single root folder, ‘/ '.
By viewing the contents of a file using the ls command it will show the following output: drwxr-xr-x 4 root root 4096 Sep 9 2014 test
The first of these flags denotes the type of file, either: d = directory, - = ordinary file or l = symbolic link.
The next three positions (2-4) will determine the owner permissions with r = read, w = write, and x = execute.
Positions 5 to 7 will then denote these for other users within the same group while Positions 8 to 10 will denote the relevant permissions for all other users.
Standard file permissions can also be supported using Access Control Lists (ACLs) which will provide a centralized point that defines the specific users that can either read, execute or write to a file. The use of the getacl and setacl commands can allow to set permissions accordingly in terms of multiple users for example.

An alternative method would include the use of Access Control Lists whereby all 4,990 users that need access to the file is now allowed within a specified ACL. References
Matloff, N. (1998, October 19). File Systems in Unix. Retrieved from EDU: http://heather.cs.ucdavis.edu/~matloff/UnixAndC/Unix/FileSyst.pdf
Pate, S. (2003). UNIX Filesystems: Evolution, Design, and Implementation. Wiley.

References
This is a hanging indent. To keep the hanging indent format, triple click your mouse on this line of text and replace the information with your reference entry. You can use the Reference and Citation Examples (Center for Writing Excellence>Tutorials and Guides>Reference and Citation Examples) to help format your source information into a reference entry.
The reference page always begins on the top of the next page after the conclusion.

References: This is a hanging indent. To keep the hanging indent format, triple click your mouse on this line of text and replace the information with your reference entry. You can use the Reference and Citation Examples (Center for Writing Excellence>Tutorials and Guides>Reference and Citation Examples) to help format your source information into a reference entry. The reference page always begins on the top of the next page after the conclusion.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    11. What does grep do? The grep command is used to search text or searches the given file for lines containing a match to the given strings or words. By default, grep displays the matching lines…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    Is the process of determining if an authenticated user has access to the resources they requested. Is finding out if the person, once identified is permitted to manipulate specific resources. This is usually determined by finding out if that person is of a particular role that has access to the resources. Authorization is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    References: This is a hanging indent. To keep the hanging indent format, simply delete this line of text using the backspace key, and replace the information with your reference entry.…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®?…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Name two parameters that you can set to enhance the access control to the system.…

    • 668 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Delete the text below the word References and start typing in your citations here using the APA style. Notice that if the citation takes up more than one line, the remaining lines in the citation are indented by ½ an inch. This is called a hanging indent. Please consult the BCCC Library’s handout on creating your…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Glg 101 Week 1 Review

    • 1031 Words
    • 5 Pages

    References: This is a hanging indent. To keep the hanging indent format, simply delete this line of text using the backspace key, and replace the information with your reference entry.…

    • 1031 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Explore and Discuss

    • 1383 Words
    • 6 Pages

    A.3. Please note that /root is root user’s home directory, which is not same as /.…

    • 1383 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 1 Qnt 351

    • 592 Words
    • 3 Pages

    References: This is a hanging indent. To keep the hanging indent format, simply delete this line of text using the backspace key, and replace the information with your reference entry.…

    • 592 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    References: This is a hanging indent. To keep the hanging indent format, simply delete this line of text using the backspace key, and replace the information with your reference entry.…

    • 140 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Team Reflection Week 2

    • 613 Words
    • 3 Pages

    References: This is a hanging indent. To keep the hanging indent format, simply delete this line of text using the backspace key, and replace the information with your reference entry.…

    • 613 Words
    • 3 Pages
    Satisfactory Essays

Related Topics