File system mounting, sharing, protection

Slides:



Advertisements
Similar presentations
Hive Security Yongqiang He Software Engineer Facebook Data Infrastructure Team.
Advertisements

Test practice Multiplication. Multiplication 9x2.
Login dan Permission dfd, Jenis Login dfd, 2012 SQL Server Authentication Membutuhkan password Windows Authentication Mode Tidak membutuhkan password.
Chapter 11 File Systems and Directories. 2 File Systems File: A named collection of related data. File system: The logical view that an operating system.
1 Chapter Overview Understanding and Applying NTFS Permissions Assigning NTFS Permissions and Special Permissions Solving Permissions Problems.
11 WORKING WITH GROUPS Chapter 7. Chapter 7: WORKING WITH GROUPS2 CHAPTER OVERVIEW  Understand the functions of groups and how to use them.  Understand.
File Security. Viewing Permissions ls –l Permission Values.
Chapter 10 File System Security. Security Policies security policies are doors maintain a balance between total access and total security UNIX has two.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 10: File-System Interface Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 10: File-System Interface File Concept.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
Linux File Security. What is Permission ? Specifies what right are granting to users to access the resources available in the computer. So that important.
An Introduction to Operating Systems. Definition  An Operating System, or OS, is low-level software that enables a user and higher-level application.
Chapter 7 WORKING WITH GROUPS.
Operating System Concepts with Java – 7 th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 10: File-System Interface.
Operating System Security CS460 Cyber Security Spring 2010.
Unix System Administration Rootly Powers Chapter 3.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 10: File-System Interface.
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
Page 110/17/2015 CSE 30341: Operating Systems Principles Acyclic-Graph Directories  Have shared subdirectories and files.
Chapter 10: File-System Interface Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 1, 2005 Chapter 10: File-System.
Chapter 11 File Systems and Directories. 2 File Systems File: A named collection of related data. File system: The logical view that an operating system.
10.1 Silberschatz, Galvin and Gagne ©2005 Operating System Principles 10.4 File System Mounting A file system must be mounted before it can be accessed.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
UNIX System Protection. Unix History Developed by Dennis Ritchie and Ken Thompson at AT&T Bell Labs Adapted some ideas from the Multics project in 1969.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
Workbook 4 User & Group Permissions RH030 Linux Computing Essentials.
Access Control  privilege How does your code manage who has access to what?  authorization  permission Two OS models: Unix Windows.
Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
The UNIX File System (1) Some important directories found in most UNIX systems.
CSCI 530 Lab Authorization. Review Authentication: proving the identity of someone Passwords Smart Cards DNA, fingerprint, retina, etc. Authorization:
Access Control Lesson Introduction ●Understand the importance of access control ●Explore ways in which access control can be implemented ●Understand how.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Goals of Protection Operating.
Privilege Management Chapter 22.
ITEC 502 컴퓨터 시스템 및 실습 Chapter 10-2: File Systems Mi-Jung Choi DPNM Lab. Dept. of CSE, POSTECH.
Introduction to AFS IMSA Intersession 2003 An Overview of AFS Brian Sebby, IMSA ’96 Copyright 2003 by Brian Sebby, Copies of these slides.
Chapter 15: Access Control Mechanisms Dr. Wayne Summers Department of Computer Science Columbus State University
Lecture 4 & 5: System Architecture  File systems  Devices  File system permissions  Review of Linux runlevels  In-class exercise.
1 Chapter 12: Design Principles Overview –There are principles for many kinds of design Generally, a design should consider: Balance, Rhythm, Proportion,
Company LOGO Security in Linux PhiHDN - VuongNQ. Contents Introduction 1 Fundamental Concepts 2 Security System Calls in Linux 3 Implementation of Security.
ITMT Windows 7 Configuration Chapter 6 – Sharing Resource ITMT 1371 – Windows 7 Configuration 1.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition Chapter 10: File-System Interface.
Windows 7 Ultimate
Introduction to Unix – CS 21
File Share Parameters File share resources can be normal shares, DFS roots, or Dynamic Shares. You configure file share permissions at the same time and.
Chapter 6 – Users, Groups, and Permissions
2. OPERATING SYSTEM 2.1 Operating System Function
Chapter 8 File Security.
Exploring the UNIX File System and File Security
File system(conti..) Lecture November 2018.
Lecture 44 Syed Mansoor Sarwar
CE Operating Systems Lecture 21
Chapter 2: System Structures
UNIX System Protection
Security and File Permission
O.S Lecture 14 File Management.
Chapter 28: User Security
OS Access Control Mauricio Sifontes.
The Linux Command Line Chapter 4
Chapter Introduction 3.2 The UNIX Model of Ownership
Ашық сабақ 7 сынып Файлдар мен қапшықтар Сабақтың тақырыбы:
Windows басқару элементтері
Access Permission and Protection mode
Қош келдіңіздер!.
Информатика пән мұғалімі : Аитова Карима.
BASIC FILE ATTRIBUTES.
Access Control and Audit
The Linux Command Line Chapter 4
Presentation transcript:

File system mounting, sharing, protection 11.5. File Sharing 11.5.1. Multiple Users Owner Group approach UID in Unix, SID in Windows 11.6. Protection 11.6.1. Types of access Silberschatz, 6th ed. Chapters 11.

File System Mounting mount point Mounted file system New file system This is not lost

File sharing In a multiuser environment the operating system either can allow a user to access the files of other users by default or it may require that a user specifically grant access to the files.

Protection

Owner Group Universe approach

Owner Group Universe approach

UID in Unix, SID in Windows

UID in Unix, SID in Windows

Process Effective Permissions