SlideShare a Scribd company logo
1 of 29
FILE
PROTECTION
4/12/2018
OUTLINE
4/12/2018
FILE PROTECTION
4/12/2018
•The Protection of a file is mostly needed in multi-user
environment where a file is shared among several users.
•On system which does not permit access to the files of
other users, protection is not required.
•Protection mechanism must provide controlled access by
restricting the types of files which can be made.
•Access is permitted or denied depending upon several
factors, one of which is the type of access requested.
4/12/2018
Several different types of operations
may be controlled. These operations
are:
•Reading from the file.
•Writing on the file.
•Executing the file by loading into main
memory.
•Writing new information at the end of a
file.
•Deleting the file and releasing the
space.
Operations
Other
operations
4/12/2018
FILE NAMING
PASSWORDS
ACCESS CONTROL
FILE NAMING
4/12/2018
4/12/2018
Why is
file
naming
important?
How to
change a
file name?
What not
to do
when
naming
file?
Best
Practices
for file
naming
4/12/2018
HOW TO NAME YOUR FILES?
 Nobody likes unorganized
folders.
 If everyone took the initiative to
name their files correctly, there
wouldn't be such a hassle
downloading and sorting files.
 This is an example of poor
mp3 naming.
4/12/2018
4/12/2018
You must be much more
descriptive.
-Give all the information that is
necessary.
-Do not use ID tags. ID tags hide
the truth, and hiding the truth is
wrong.
- Instead of ID tags, use
parenthesis and underscores to
specify meta data.
4/12/2018
Name your
files and
folders
wisely..!
 You must adhere to file-naming conventions when
saving files :
1.Case sensitivity – upper and lower case are different
 True in Linux and Unix variations, not in Windows
2. Maximum length (Windows 260 characters)
3. Spaces allowed
4. Digits allowed
5.  / : * ? " < > | not allowed (Special Characters)
6. File names not allowed (con, nul, prn)
 File extensions provide clues to the file contents.
 OS uses extensions to know which application created the file
and the internal format of the file.
FILENAME EXTENSIONS
4/12/2018
Extension Type of Document Application
.doc or .docx Word processing document Microsoft Word
.xls or .xlsx Workbook Microsoft Excel
.ppt or .pptx PowerPoint presentation MS PowerPoint
.accdb Database Microsoft Access
.gif, .jpg, .png Images Windows Image Viewer
.mp4, .mp3 Videos, audio Windows Media
.zip Compressed file WinZip
.pdf Portable Document Format Adobe Acrobat
.htm or .html Web page Hypertext Markup
Language
PASSWORDS
4/12/2018
4/12/2018
In this approach, password is associated with each
file.
Just as a password is required to access a computer
system, access to each file will be also controlled by
a password.
A password is a string of characters used to verify the identity of a user during
the authentication process. Passwords are typically used in conjuncture with a username; they
are designed to be known only to the user and allow that user to gain access to a device,
application or website.
LIMITATIONS
There are, however, several disadvantages to this
scheme:
 If we associate a separate password with each
file, the number of passwords that need to he
remembered are quite large, making the scheme
impractical. If only one password is used for all the
files, then once it is discovered all files are
accessible. Some systems allow a user to
associate a password with a subdirectory rather
than an individual file, to deal with this problem.
4/12/2018
 Commonly, only one password is associated with each file. Thus protection is on an
all-or-nothing basis. To provide protection on a more detailed level, multiple
Passwords are needed.
4/12/2018
HACKERS!!
ACCESS CONTROL
4/12/2018
4/12/2018
ACCESS CONTROL |SECURITY TECHNIQUE |
RESTRICT USERS
4/12/2018
APPROACH : to make access dependent on the
identity of the user.
Multiple users >> different types of access to a
file or directory.
‘‘ An access list can be associated with each
file and directory, specifying the user name
and the types of access allowed- for each
user. ’’
WORKING!!!
1. USER REQUESTS ACCESS
2. OS CHECKS THE ACCESS LIST
3. IF (USER IS PRESENT IN AL)
ACCESS ALLOWED;
ELSE
ACCESS DENIED; //protection violation
DISADVANTAGES OF
ACCESS LISTS
4/12/2018
This has two undesirable consequences:
•Constructing such a list may be a tedious and
unrewarding task, especially if we not know in advance
the list of users in the system.
•The directory entry which previously was of fixed size
needs now to be of variable size, resulting in space
management being more complicated.
These problems can be resolved by using a condensed
version of the access list.(ACCESS GROUPS)
To condense the length of the access list, many
systems recognize three classifications of users in
connection with each file:
Owner
The user who created
the file.
Universe(Others)
All other users in the
system
Group
A set of users who
are sharing the file
and need similar
access.
A SITUATION TO ILLUSTRATE THE
WORKING OF ACCESS GROUPS :
4/12/2018
Consider a person, X, who is working on a new project. She has hired three graduate students (A,
B, C) to work on the project.
X
CBA
Owner
Group
Re protection associated with this file is as follows:
 X should be able to invoke all operations on the file.
 A, B and C should only be able to read, write, and execute the file. They should be
allowed to delete the file.
4/12/2018
Read(r)
Write(w)
Execute(x)
Delete
All operations
 All other users should be able to execute the file.
(X is interested in letting as many people as possible play the game in order to obtain
appropriate feedback.)
 To achieve such a protection, a new group must be created with member A, B, C. The
name of the group must be then associated with the file project, and the access-right
must be set in accordance with the policy that is outlined .
4/12/2018
Others(universe)
4/12/2018
Rockstar North
(OWNER)
FURTHERMORE…
Programmer(s) •Obbe Vermeij
•Adam Fowler
Artist(s) Aaron Garbut
Writer(s) •Dan Houser
•James Worrall
Composer(s) Lex Horton
(GROUP)
UNIVERSE(USE
RS)
4/12/2018
EXECUTE
4/12/2018
Secure Social
Profiles..
4/12/2018
Secure
Confidential
Data..
THANK YOU!!
Compiled by-
 Kriti Katyayan (16070124024)
 Ameya Kshirsagar(16070124025)
 Vedang Lad(16070124026)
4/12/2018
Keep your files
safe!

More Related Content

What's hot

GDPR Datatags DANS Oct 2017
GDPR Datatags DANS Oct 2017GDPR Datatags DANS Oct 2017
GDPR Datatags DANS Oct 2017pkdoorn
 
APLIC 2014 - Dataverse Project
APLIC 2014 - Dataverse ProjectAPLIC 2014 - Dataverse Project
APLIC 2014 - Dataverse ProjectAPLICwebmaster
 
RefWorks - Importing text files
RefWorks - Importing text filesRefWorks - Importing text files
RefWorks - Importing text filesUCT
 
An Introduction to AtoM, Archivematica, and Artefactual Systems
An Introduction to AtoM, Archivematica, and Artefactual SystemsAn Introduction to AtoM, Archivematica, and Artefactual Systems
An Introduction to AtoM, Archivematica, and Artefactual SystemsArtefactual Systems - AtoM
 

What's hot (6)

Dspace Webinar
Dspace WebinarDspace Webinar
Dspace Webinar
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
 
GDPR Datatags DANS Oct 2017
GDPR Datatags DANS Oct 2017GDPR Datatags DANS Oct 2017
GDPR Datatags DANS Oct 2017
 
APLIC 2014 - Dataverse Project
APLIC 2014 - Dataverse ProjectAPLIC 2014 - Dataverse Project
APLIC 2014 - Dataverse Project
 
RefWorks - Importing text files
RefWorks - Importing text filesRefWorks - Importing text files
RefWorks - Importing text files
 
An Introduction to AtoM, Archivematica, and Artefactual Systems
An Introduction to AtoM, Archivematica, and Artefactual SystemsAn Introduction to AtoM, Archivematica, and Artefactual Systems
An Introduction to AtoM, Archivematica, and Artefactual Systems
 

Similar to File Protection

Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System InterfaceWayne Jones Jnr
 
Learn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems pptLearn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems pptgeethasenthil2706
 
File Management
File ManagementFile Management
File ManagementNajma Alam
 
Operating System File Management Unit v.pptx
Operating System File Management Unit v.pptxOperating System File Management Unit v.pptx
Operating System File Management Unit v.pptxSanthiNivas
 
file management_osnotes.ppt
file management_osnotes.pptfile management_osnotes.ppt
file management_osnotes.pptHelalMirzad
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data ManagementSoushilove
 
Unit 4 file and data management
Unit 4 file and data managementUnit 4 file and data management
Unit 4 file and data managementSoushilove
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data ManagementSoushilove
 
File concept and access method
File concept and access methodFile concept and access method
File concept and access methodrajshreemuthiah
 
Unit 3 file management
Unit 3 file managementUnit 3 file management
Unit 3 file managementKalai Selvi
 
Model of file system
Model of file systemModel of file system
Model of file systemIshucs
 
Ch12-OS9e-modified (1).pptx
Ch12-OS9e-modified (1).pptxCh12-OS9e-modified (1).pptx
Ch12-OS9e-modified (1).pptxudithaisur
 
UserGuideHDFS_FinalDocument
UserGuideHDFS_FinalDocumentUserGuideHDFS_FinalDocument
UserGuideHDFS_FinalDocumentAnna Ellis
 

Similar to File Protection (20)

Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System Interface
 
Learn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems pptLearn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems ppt
 
File Management
File ManagementFile Management
File Management
 
Licão 04 permissions
Licão 04 permissionsLicão 04 permissions
Licão 04 permissions
 
Operating System File Management Unit v.pptx
Operating System File Management Unit v.pptxOperating System File Management Unit v.pptx
Operating System File Management Unit v.pptx
 
file management_osnotes.ppt
file management_osnotes.pptfile management_osnotes.ppt
file management_osnotes.ppt
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data Management
 
Unit 4 file and data management
Unit 4 file and data managementUnit 4 file and data management
Unit 4 file and data management
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data Management
 
File concept and access method
File concept and access methodFile concept and access method
File concept and access method
 
Unit 3 file management
Unit 3 file managementUnit 3 file management
Unit 3 file management
 
CH11.pdf
CH11.pdfCH11.pdf
CH11.pdf
 
Operating System
Operating SystemOperating System
Operating System
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
File management
File managementFile management
File management
 
File
FileFile
File
 
Model of file system
Model of file systemModel of file system
Model of file system
 
Ch12-OS9e-modified (1).pptx
Ch12-OS9e-modified (1).pptxCh12-OS9e-modified (1).pptx
Ch12-OS9e-modified (1).pptx
 
Files
FilesFiles
Files
 
UserGuideHDFS_FinalDocument
UserGuideHDFS_FinalDocumentUserGuideHDFS_FinalDocument
UserGuideHDFS_FinalDocument
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 

File Protection

  • 3. FILE PROTECTION 4/12/2018 •The Protection of a file is mostly needed in multi-user environment where a file is shared among several users. •On system which does not permit access to the files of other users, protection is not required. •Protection mechanism must provide controlled access by restricting the types of files which can be made. •Access is permitted or denied depending upon several factors, one of which is the type of access requested.
  • 4. 4/12/2018 Several different types of operations may be controlled. These operations are: •Reading from the file. •Writing on the file. •Executing the file by loading into main memory. •Writing new information at the end of a file. •Deleting the file and releasing the space. Operations Other operations
  • 7. 4/12/2018 Why is file naming important? How to change a file name? What not to do when naming file? Best Practices for file naming
  • 9. HOW TO NAME YOUR FILES?  Nobody likes unorganized folders.  If everyone took the initiative to name their files correctly, there wouldn't be such a hassle downloading and sorting files.  This is an example of poor mp3 naming. 4/12/2018
  • 10. 4/12/2018 You must be much more descriptive. -Give all the information that is necessary. -Do not use ID tags. ID tags hide the truth, and hiding the truth is wrong. - Instead of ID tags, use parenthesis and underscores to specify meta data.
  • 11. 4/12/2018 Name your files and folders wisely..!  You must adhere to file-naming conventions when saving files : 1.Case sensitivity – upper and lower case are different  True in Linux and Unix variations, not in Windows 2. Maximum length (Windows 260 characters) 3. Spaces allowed 4. Digits allowed 5. / : * ? " < > | not allowed (Special Characters) 6. File names not allowed (con, nul, prn)  File extensions provide clues to the file contents.  OS uses extensions to know which application created the file and the internal format of the file.
  • 12. FILENAME EXTENSIONS 4/12/2018 Extension Type of Document Application .doc or .docx Word processing document Microsoft Word .xls or .xlsx Workbook Microsoft Excel .ppt or .pptx PowerPoint presentation MS PowerPoint .accdb Database Microsoft Access .gif, .jpg, .png Images Windows Image Viewer .mp4, .mp3 Videos, audio Windows Media .zip Compressed file WinZip .pdf Portable Document Format Adobe Acrobat .htm or .html Web page Hypertext Markup Language
  • 14. 4/12/2018 In this approach, password is associated with each file. Just as a password is required to access a computer system, access to each file will be also controlled by a password. A password is a string of characters used to verify the identity of a user during the authentication process. Passwords are typically used in conjuncture with a username; they are designed to be known only to the user and allow that user to gain access to a device, application or website.
  • 15. LIMITATIONS There are, however, several disadvantages to this scheme:  If we associate a separate password with each file, the number of passwords that need to he remembered are quite large, making the scheme impractical. If only one password is used for all the files, then once it is discovered all files are accessible. Some systems allow a user to associate a password with a subdirectory rather than an individual file, to deal with this problem. 4/12/2018
  • 16.  Commonly, only one password is associated with each file. Thus protection is on an all-or-nothing basis. To provide protection on a more detailed level, multiple Passwords are needed. 4/12/2018 HACKERS!!
  • 18. 4/12/2018 ACCESS CONTROL |SECURITY TECHNIQUE | RESTRICT USERS
  • 19. 4/12/2018 APPROACH : to make access dependent on the identity of the user. Multiple users >> different types of access to a file or directory. ‘‘ An access list can be associated with each file and directory, specifying the user name and the types of access allowed- for each user. ’’ WORKING!!! 1. USER REQUESTS ACCESS 2. OS CHECKS THE ACCESS LIST 3. IF (USER IS PRESENT IN AL) ACCESS ALLOWED; ELSE ACCESS DENIED; //protection violation
  • 20. DISADVANTAGES OF ACCESS LISTS 4/12/2018 This has two undesirable consequences: •Constructing such a list may be a tedious and unrewarding task, especially if we not know in advance the list of users in the system. •The directory entry which previously was of fixed size needs now to be of variable size, resulting in space management being more complicated. These problems can be resolved by using a condensed version of the access list.(ACCESS GROUPS)
  • 21. To condense the length of the access list, many systems recognize three classifications of users in connection with each file: Owner The user who created the file. Universe(Others) All other users in the system Group A set of users who are sharing the file and need similar access.
  • 22. A SITUATION TO ILLUSTRATE THE WORKING OF ACCESS GROUPS : 4/12/2018 Consider a person, X, who is working on a new project. She has hired three graduate students (A, B, C) to work on the project. X CBA Owner Group
  • 23. Re protection associated with this file is as follows:  X should be able to invoke all operations on the file.  A, B and C should only be able to read, write, and execute the file. They should be allowed to delete the file. 4/12/2018 Read(r) Write(w) Execute(x) Delete All operations
  • 24.  All other users should be able to execute the file. (X is interested in letting as many people as possible play the game in order to obtain appropriate feedback.)  To achieve such a protection, a new group must be created with member A, B, C. The name of the group must be then associated with the file project, and the access-right must be set in accordance with the policy that is outlined . 4/12/2018 Others(universe)
  • 25. 4/12/2018 Rockstar North (OWNER) FURTHERMORE… Programmer(s) •Obbe Vermeij •Adam Fowler Artist(s) Aaron Garbut Writer(s) •Dan Houser •James Worrall Composer(s) Lex Horton (GROUP)
  • 29. THANK YOU!! Compiled by-  Kriti Katyayan (16070124024)  Ameya Kshirsagar(16070124025)  Vedang Lad(16070124026) 4/12/2018 Keep your files safe!