File Management Protection Scheme

Page 1 of 50 - About 500 Essays
  • Free Essay

    File Management Protection Scheme

    File Management Protection scheme File Management Protection scheme When considering a system that supports 5,000 users, wanting to allow 4,990 of those users to be able to access one file can be accomplished in many different ways. This paper will discuss two different options on how to complete this task. One of the ways that this task could be completed is to create an access control list with the name of all 4990 users. The second option will be to put the 4,990 user in one group and set

    Words: 410 - Pages: 2

  • Free Essay

    Pos 355

    UNIX Protection Scheme Cedric Lee POS/355 Scott Stewart March 25, 2013 UNIX Protection Scheme There is an operation system that supports 5,000 users, and the company only wants to allow 4,990 users permission to access one file. In order to have a protection scheme in UNIX, a number of operations need to be performed first in order for this to work. UNIX file management hierarchy is very essential to know in order to understand and devise a plan that will allow this protection scheme to protect

    Words: 385 - Pages: 2

  • Premium Essay

    File Management

    File Management Paper {Your Name} {Your Class} {Date} {Instructor} File Management Paper Before we discuss how I would specify a protection scheme in UNIX® for 4990 users out of 5000 to access one file I think we need to first discuss what file management is in UNIX® and how security is implemented for this type of request. File management is a lot like file management in the DOS days of computers operating systems. Even with the early days of Windows up to Windows 3.11 file

    Words: 754 - Pages: 4

  • Free Essay

    File Management

    File Management Paper There are issues that arise concerning file sharing in a multiuser system, and that is access rights and the management of simultaneous access. Access rights to a file is granted unique users whether singular or grouped. A flexible tool is provided to allow extensive file sharing among the users while providing a number of options so that certain access can be harnessed or controlled (Stallings , 2012). Although a wide range of access is being used, there is still a list

    Words: 793 - Pages: 4

  • Free Essay

    File Management

    File Management Duane Borchick POS/355 December 24, 2012 Paul Rouk File Management Considering a system that is to support 5000 users, but is only to allow 4990 of the users to have access to one file can be accomplished in a variety of different ways. There are two different options of how to complete this task that will be discussed in this paper. The first and most popular way to accomplish this task is to have an access control list made up with the names of all 4990 user on it. With

    Words: 558 - Pages: 3

  • Free Essay

    File Management Pos/355

    File Management POS/355 February 25, 2013 Bhupinder Singh File Management Imagine a system that support 5000 users, and only allow 4000 of those users can access one file. This can be accomplished in many different ways. One option is for the 4000 users placed in a specific group and then set another group access to the group already on file. The second option is would be the way to go, and that is to have an access control list made up with names of all 5000

    Words: 584 - Pages: 3

  • Free Essay

    File Management

    File Management In a computer systems protection is needed for data to keep it from unauthorized access. Protection can be accomplished in many ways. For a small single user system, we might provide protection by physically removing the floppy disks and locking them in a desk drawer or file cabinet. In a multiuser system, however, other mechanisms are needed. Utilizing controlled access to limit the type of access to files is one such protection mechanism. Some of the types of controlled access

    Words: 663 - Pages: 3

  • Free Essay

    File Management

    File Management UNIX systems are based on the access control of files scheme which was introduced in the very early versions of UNIX. The way this works is that each UNIX user has an assigned unique user identification number which also puts this user ID into a primary group as well as other groups if the user ID needs it. These groups are identified, like the user’s ID, with a group ID. When a user creates a file, it is designated as owned solely by that user and marked with that user’s ID.

    Words: 550 - Pages: 3

  • Free Essay

    Memory Management

    File Management Requirements Alan McKinney POS/355 May, 19 2014 Ellis Hodgdon This paper will discuss the protection that is within the UNIX operating system in regards to naming, file sharing and the importance of allowing permissions to users for accessing files. One topic in particular will be discussed in this paper and that will be the ability to allow access of one file to multiple end users while other users will be restricted from gaining access

    Words: 733 - Pages: 3

  • Free Essay

    It Specalist

    File Management In the company which I am employed, we have employees which access one file at a time. We offer any user to access the file at any time, but if a user already have the file open. He or she cannot make any changes to the file, until the primary user close the following file. This will protect the file from getting damage by other users, or other problems which may occur. When considering a system that supports 5,000 users. Suppose to only wanting to allow 4,990 of those users to be

    Words: 320 - Pages: 2

Previous
Page   1 2 3 4 5 6 7 8 9 50