Thursday, May 23, 2019
File Management in Unix Essay
When it comes to UNIX systems all user data is unionized and stored in files. These files are subsequently organized into a management structure comprising of directories and sub-directories. Much like forest and organizational units when it comes to active directory, UNIX  besides has the directories and sub-directories organized into a tree-like structure that it calls a file system. UNIX also has three basic types of files.When it comes to security files  lav be secured through UNIX file permissions as well as access control lists (ACLs). One of the most  crucial things to keep in mind when giving permissions is to establish file and directory  ownership. Traditional UNIX file permissions can assign ownership to three  chassises of users that are user, group, and others. The user class is usually the file or directory owner, and that is the individual that created the file.The owner of a file can decide who has the right to read the file, or  let the ability to   salvage the file    which means they can make changes. This is effective if you had an organization that has five thousand employees and you only wanted four thousand nine-hundred ninety people to have permission to view and/or make changes. Another ability that the owner has is to decide if the file is a command or to  feed the file. Groups are where you can put a number of users together to establish permissions.It is an effective  management to manage policies for users. The others class is all other users who are not the file owner and are not members of the group. An important thing to note is that the owner of a file can usually assign or modify file permissions. to boot the root account can change a files ownership to override system policy. In UNIX there are four  dissimilar types of file permissions. The first permission is read and it designates which users can open and read the contents of a file only, but cannot make any changes.The second is the write permission, and that designates which    users can modify the contents of a file or even delete the file. The next file permission that can be given is the execute permission. This permission designates which users can execute the file if it is a  chopine or shell script. Another thing it does is that those individuals with this permission can also run the program with one of the exec system calls. The denied permission designates which users cannot read, write, or execute file.The types of file permissions apply to regular files, and to special file such as devices, sockets, and named pipes (FIFOs). A great way for any business organization to protect their files effective and to ensure that only people that have the need to access the appropriate is information is to apply the  some protective measure that was discussed. You can protect the files in a directory by setting restrictive file permission on that directory.  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.