This website uses cookies to ensure you have the best experience. Learn more

How The Unix Permission System Implements Access Control

440 words - 2 pages

Explain how the UNIX permission system implements access control. Describe an extension of this system that permits finer control.

Access Control in Unix
UNIX has an implementation of access control lists for providing the features of security to its users. Every user has a right to log into the system with his/her credentials (username and password) and initiate a process which can further make system requests. Every process is assigned a unique identifying number called the process “uid”. This number can be obtained from the /etc/password file. A sample record from this file looks like below:

“uid” essentially is the user id ...view middle of the document...

There are 12 mode bits which are used to encode the privileges related to protection. Out of these 12 bits, first 9 bits are divided into 3 groups. Each group contains 3 bits describing the permissions related to user (u), group (g) and others (o). If a bit is set to “ON”, the corresponding privilege is enabled (r – read, w – write, x – execute).

Extension of Unix security system
A finer security mechanism can be enabled in Unix by setting the bits in the last remaining triplet. First two out of the remaining last 3 bits are called the “suid” (set user id) and “sgid” (set group id). Usually, one process is started and maintained by one user under one group id or to say one domain. But for higher level of programs exchanging data among different domains, more focused security is needed. When the suid of a file is set to “ON”, it does not run under the uid of the process initiating a call to it, but under the “effective uid” of the uid of the user who is the actual owner of that file. The sgid is used in a similar fashion on the group level.

1. Montecino, Virginia. Unix Permissions. Available from: <>
2. YoLinux. Managing Group Access. Available from: <>
3. Dart Mouth. Understanding file permissions on Unix: a brief tutorial. Available from: <>

Other Papers Like How The Unix Permission System Implements Access Control

Linux And Windows Server Critique Essay

2469 words - 10 pages . According to Noyes (2010) there are five key factors that make Linux superior to Windows. • Privileges • Social Engineering • The Monoculture Effect • Audience Size • How Many Eyeballs Windows users are assigned administrator privileges that gives those individuals full access to the entire system and all files. All it would take for a catastrophic system meltdown would be one disgruntled employee with access to load malicious code that could

Eed 430 Week 5 Assignment Integrated Unit

355 words - 2 pages .  Do not submit a written response. POS 355 Week 2 Individual Assignment File Management Paper For this assignment, you will choose one of the following options: ·  Option 1, File Access: Write a 2-page paper that discusses the following: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNIX®? ·  Option

Directions For Web And E-Commerce Application Security

3283 words - 14 pages control policies should be derived as well. One approach (from the Data Warehouse world) is view security [20]. This approach splits information and physical permissions: Permission to access data on a particular system, and permission to access a particular piece of data, are separated. The question “Can user u access objection systems ?” is computed automatically based on the permissions. This saves the task of defining both local and global access


6786 words - 28 pages every Android application runs in its own process. The Libraries is used by various components of the Android system, such as Media Libraries, 3D libraries, and etc. • The upper level is Application framework and Application. Application framework is offering developers the ability to build extremely rich and innovative applications. Developers are free to take advantage of the device hardware, access location information, run background services

Introduction To Network Security

428 words - 2 pages because the software is developed by computer scientists and engineers. Faults are a precise interaction of hardware and software that can be fixed given enough time. 15. The Chief Information Security Officer (CISO) 16. It was the first and operating system created with security as its primary goal. Shortly after the restructuring of MULTICS, several key engineers started working on UNIX which did not require the same level of security

Hardware & Software Concepts

572 words - 3 pages 1. Why is a peer-to-peer architecture not desirable in a business environment? Peer-to-peer architecture is not desired in a business environment because it is difficult or impossible to establish centralized control to restrict inappropriate access and to ensue data integrity. 2. How many instructions can be executed by a single computer’s CPU at a time? A single CPU can only process one instruction at a time. 3. What are the 4

Pos 355 Week 3 - Gnu Public License

643 words - 3 pages | Open and Closed Source Systems | GNU Public License and It’s Role | Type College Here | [Type the author name] | 5/13/2013 | | GNU General Public License To start, a GNU is a Unix-like OS that gives users complete freedom to modify or edit the software as they see fit. (, 2013) “A Unix-like operating system is a software collection of applications, libraries, and developer tools, plus a program to allocate

Inside The Internet

762 words - 4 pages message processor allowed two computers to “talk” with each other. With this ability email was added in and dominated the traffic on the ARPANET. The addition of email created a dynamic social human network and showed the social potential of the Internet. Over at Bell Laboratories, Dennis Richie created the UNIX, a user-friendly operating system. The system was licensed to the academic world. Nearly every university adopted Bell Telephone’s UNIX

Remote Access Control Policy Definition

300 words - 2 pages “Permission” to access the servers remotely if the connection attempt matches the policy conditions. Some of the requirements would include strict control enforced via one-time password authentication or public keys with strong pass-phrases. Also, anyone trying to gain access must not be connected to any other network at the same time, aside from personal home networks under the user's complete control. Further, employees with access must not use email

Principles Of Information Security 4th Ed Chapter 1 Review Questions

801 words - 4 pages the first and operating system created with security as its primary goal. Shortly after the restructuring of MULTICS, several key engineers started working on UNIX which did not require the same level of security. 17. How has computer security evolved into modern information security? In the early days before ARPANET machines were only physically secured. After ARPANET it was realized that this was just one component. 18. What was

Is3230 Lab 1

426 words - 2 pages definition do you think is required to support this type of access control implementation? You can use groups to grant permissions to similar types of users and to simplify account administration. 3. List the 5 different access control permissions that can be enabled on user folders and data within a Microsoft Windows Server. Read, Write, Read and execute, List folder contents, and modify 4. What is the lowest level of permission you can enable

Related Essays

How Does Atwood’s Portrayal Of Control On Pages 22 23 Typify Atwood’s Treatment Of Women In The Rest Of The Novel?

772 words - 4 pages How does Atwood’s portrayal of control on pages 22-23 typify Atwood’s treatment of women in the rest of the novel? In Margaret Atwood’s novel ‘The Handmaids Tale ‘women are objectified and live under an oppressive regime. In this essay I will be exploring Atwood’s presentation of women and women’s purpose in society. In ‘The Handmaids Tale ‘phallic imagery is used to distinguish women’s position in society. “The commander’s wife directs

Look At Items A To C. How Are Social Control And Social Order Maintained In The Face Of Social Inequality From And Conflict And Consensus Perspective

538 words - 3 pages Look at Items A to C. How are social control and social order maintained in the face of social inequality from, a) A conflict perspective: The conflict perspective emphasizes the role of the bourgeoisie and the proletariat, it sees the role of the bourgeoisie to gain as much profit as they can from the proletariat, even though this is seen as incredibly unfair in the conflict perspective, it shows us that many of the people just accept the

Unix/Linux Versus Mac Versus Windows Essay

4984 words - 20 pages its own attributes. In this case, the process does not have a handle opened to its access token. If the process attempts to open such a handle, the security system determines whether this is permitted and therefore whether the process may change its own attributes” (Stallings, 2012). The process must also depend on the virtual memory manager to modify any of its structures. File Management UNIX/Linux In UNIX and Linux, all data is

Comparison Between The Unix And The Windows 2008 Servers

1747 words - 7 pages able to show you is why the UNIX server is also a great server, and how to manage and learn the right administration tools. Also in this research article I will show various differences between the many different operating systems and the many similarities. I will also research and see if there is a certain percentage of companies that use certain operating system over the others and what that possible reason as the reason. Why is it