Protection Scheme

Brandi Antles
POS/355
File Management Paper
June 19, 2014
Yevgeniy Tovshteyn

Imagine a system that supports 5,000 users, and only allows 4,000 of those users to access one file. This can be accomplished in several different ways. One option is for the 4,000 users to be placed into a specific group and then set another group access to the group already on file. The second option would be the one to consider, because it would be to have an access control list made up with the names of all 5,000 users on it.
In this paper I will be discussing and giving you a look into a protection scheme that could be used in an efficient way that will provide that protection to the system. There are certain techniques to protect the systems directories, files, and folders. Most Information Technology (IT) departments will set up appropriate file permissions on the files, set up certain tools to check accounts security, and make sure that each account and user set up passwords when in the systems. Security properties can be the foundation of protecting this. This paper will discuss about the security descriptor also referred to as Access Control List (ACL).
There are two completely different types of ACL’s. Access Control List is specifically for the directory and files, and Access Control Default (ACD) can only be associated with the directory. For Example: when a file is in the directory and does not have access to the Access Control List (ACL) it will use the rule of default for the directory. So when setting up 500 users on the system they can access the list and find out if those users are permitted to have access to that specific file. However; one rule of thumb when working with the system is it allows the monitor systems log files, and it monitors the account security on a regularly basis.
When it comes to file permission the Access Control List (ACL) will provide sufficient control over that of the UNIX® files. UNIX® files offer protection on the read where users...