Premium Essay

File Managment

In: Computers and Technology

Submitted By chale0630
Words 403
Pages 2
File Management (Option 1)
POS 355
July 29, 2015
Peng

File Management (Option 1) Access Rights is an accommodating tool that can be used to allow users on a network to file share (Stallings, 2015, p. 541). In most systems, users and groups of users have a certain granted access to files. There are many different access rights that can be assigned and are assigned based on the level of the user. Specifying which users can access one file in a system being supported by 5,000 users can be done by creating an access control list with the names of the 4,990 users who need access. Another way to allow the 4,990 users to access the files would be to put them all in one group and set the group access level accordingly. An access control list specifies which users are granted or denied access to certain files, and can be granted to individual users, or groups (Stallings, 2015, p. 525). In most multiuser systems, access control is enforced, and only certain users are allowed access and to perform certain actions on certain files. Access control information may include the owner, access information, and permitted actions. The owner is the individual who has control over the file, and who can grant or deny access to other users. Access information includes each of the user’s name and password. Some permitted actions that can be granted to users include reading, writing, executing, and transmission over a network (Stallings, 2015, p. 537). The owner of the file can grant all of these actions.
When granting 4,990 users access to one file another way is to group the users and grant privileges to an entire group. User groups are a set of users who are not individually defined, but need to be kept track of through the system (Stallings, 2015, p. 541). While this protection scheme can be useful, it cannot always be applied since the system restricts user groups (Stallings,…...

Similar Documents

Premium Essay

Managment

...open source version of Google file system and Map-reduce programming specification. It is the software that is used to write applications that process large amount of statistics (multi-terabyte data-sets) inparallel on big clusters (thousands of nodes) of product hardware with reliable and consistent approach. This is a distributed file base system with framework give high level API and runtime support for making and running applications on large scale data sets [22], There are many simulating tools that are available in market like CloudSim, GrimSim and cloud Analyst which are underlying projects of Melbourne university. 5.4 Experimental Results and Analysis The proposed tool is the distributed file base system. This tool can be downloaded in Linux base operating system, Ubuntu, and the same can be run on the windows operating system. After installing this on system the individual user name Hadoop is created that is single node .Log in to this user a cluster working like cloud is designed using Java 1.6. Linux is secure operating system so attacks are generated to measure the performance. After that three common attacks are performed on the system like .mandatory access attacks, SQL injection attacks and directory traversal attacks. ____________________________________________________________________________ C orresponding Author: fizza_alvi85@yahoo.com    Directory traversal attack has the purpose of accessing computer files that are not proposed to be......

Words: 4903 - Pages: 20

Free Essay

File

...configuring the | |example, it prevents hackers | | |Common Criteria Security | |from harming your programs | | |Evaluation features | |through a technique called | | | | |“sandboxing” — restricting what| | | | |actions programs can perform on| | | | |your Mac, what files they can | | | | |access, and what other programs| | | | |they can launch. | |Comments on administration |This operating system |User administration seems easy for a |Administration seems very | | |provides its own particular |beginner there seems to be more |detailed not sure that a | | |version of system-management |information on FreeBSD than other |beginner like me would be good | | |support in order to promote ......

Words: 626 - Pages: 3

Free Essay

File

...institution, organization firm. Ex-Employees. 3. Malware is a evil dangerous software.It is a program that is inserted into a system with the intent of compromising confidentiality, integrity and availability of victims data, application or operating systems. Virus is a program that attach themselves to legitimate programs on victim’s computer, where as a worm is a program that don’t attach themselves to victim’s programs. Virus is spread by email, instant messaging and file transfer etc. Direct propagating worms can jump from one computer to another with out human intervertion on the receiving computers. Because direct propagating is a weakness which allows an attacker to reduce a system's information assurance to his/her work easily. Trogan horse. 4.A program that hides itself by deleting a sys files and tacking on the sys files name by hackers or by virus or worms as a part of its payload. Trogan Horse is a program that which hides system files and shows itself a sys fileby renaming and such files are difficult to find. RAT remote access trogan,gains control on the victim’s computer remotely,like opening closing typing on victims computer. Downloader are small trojan horses that allow large trogan horses after the downloader is installed . Spyware are the Trojan horses that gather information about victim and make it available to the attackers. Cookies can be dangerous at times because they can contain too personal data/ information when exposed......

Words: 1819 - Pages: 8

Premium Essay

Managment

...employ the use of written interviews where applicants answer questions addressing key issues in the organisation. Through these channels, the Department contributes towards organisational performance. An example of a Company that performs this role well is Tesco Ireland. The Company notifies the public about vacancies. It then posts a questionnaire online and interested parties fill it at that time. This is then evaluated and those who fall within their minimum requirements are invited for an interview. In the interview, applicants are asked a number of questions and those who did extremely well are further analysed and retained. Those who did moderately well are not immediately eliminated; instead, their interview questions are kept on file then these are reviewed after six months. By so doing, the Tesco Ireland makes sure that its employees are highly capable and that they will enrich the organisation. Improvement of Compensation Packages One of the major functions of the HR department is to motivate employees. This can be done through rewards especially for those who have done well. The HR department needs to evaluate performance of employees and those who have exceeded expectations should be compensated for their actions. Research has shown that rewarding employees for good performance is the number one incentive for keeping up this trend. These compensation packages can come in the following ways; - Holiday Offers - End of Year Bonuses - Equities - Awards -......

Words: 5409 - Pages: 22

Free Essay

File

...The first thing that most new users shifting from Windows find confusing is navigating the Linux file system. The Linux file system functions differently than the Windows file system. I will compare and contrast the differences of both and takes you through the layout input/output systems of both. In Linux, there is only a single hierarchal directory structure. Everything begins from the root directory which is represented by the symbol /, which then expands into sub-directories. Windows includes various partitions and then directories under those partitions; Linux places all the partitions underneath the root directory by mounting them in specific directories. In contrast, Windows uses the letter C as its root directory. In Windows, various partitions are detected during the boot process and are assigned a drive letter. Under Linux, the system must mount partitions and devices during the boot process; otherwise it will be unaware of its existence. This might not seem very convenient to provide access to your partitions or devices, but it offers greater flexibility. This is known as the unified file system in Linux which offers several advantages over the Windows file system. For example, let's examine the /usr directory. This directory resides off the root directory and contains most of the system executables. With the Linux file system, you can choose to mount it off another partition or even off another machine over a network connection. The underlying system......

Words: 309 - Pages: 2

Free Essay

File

...agree is the judges’ decision to allow the medical staff to slowly deteriorate the victims health with medicinal procedures. The medical staff and hospital should not be allowed to slowly kill a victim by giving them medicine. It’s against the constitutional law. SHOARS v. EPSON AMERICA, INC. High-Tech Monitoring Accoring to the book, Americans are protected by privacy laws to a certain degree. The federal Omnibus Crime Control and Safe Streets Act of 1968 regulates the government's use of wiretapping to listen to telephone conversations. The Privacy Protection Act of 1974 and the Freedom of Information Act require the government to be fair when it collects, uses, and discloses private information. Sometimes, however, people file lawsuits saying the government has gone too far with an investigation. That was the case in Watkins v. United States (1957). In the 1950s, Congress was investigating communist activity in the United States. Communists were members of a political party that wanted to overthrow the federal government. John T. Watkins, a labor union official, was called before Congress to testify about known communists. Watkins refused to identify people who used to be, but no longer were, members of the Communist party. Watkins was convicted of contempt of Congress for refusing to answer such questions, but the Supreme Court reversed his conviction. The Court said Congress does not have unlimited power to investigate the private lives......

Words: 2131 - Pages: 9

Premium Essay

File Management

...File Management Nina N. Rountree POS 355 Terrence Carlson June 10, 2013 Operating systems that have numerous users with various security level clearances will require file protection. A UNIX operating system with 5,000 users could implement conventional UNIX file access controls if 4,990 of those users share the same level of security clearance. By means of a file access control structure on the UNIX operating system, each individual user is given a user ID (special user identification number). Users on a UNIX operating system will be allocated to a main class and possibly a variety of classes that will be associated with a unique class ID. Whenever a user creates a file, it is indicated by the individual’s unique user ID along with the user’s main class ID. Each individual user's accessibility is managed by the administrator with a file access control security type structure. The administrator can manage the permissions of all three main classes; read, write, and execute. Access is permitted to three types of users: the creator or owner of the file, the class the file belongs to, and various users with access to the system despite their class. The access control policy affects the level of access that is permitted by whom and under what conditions. Discretionary Access Control (DAC) manages permissions based on the requester’s identity and the regulations linked to access and permissions. Mandatory Access Control (MAC) manages permissions based on assessing......

Words: 526 - Pages: 3

Premium Essay

File Management

...Running Head: INSTALLATION OF OFFICE, WINDOWS OS, AND FILE MANAGEMENT “Installation Complete” Thomas Sharkey IT133-15 Software Applications Unit_1 Project April 2, 2010 INSTALLATION OF OFFICE, WINDOWS OS, AND FILE MANAGEMENT Abstract This paper will focus on the various differences of Microsoft Office 2007 Standard and Professional suites that include ram, computer processor speed, and hard disk space requirements. I will also discuss brief descriptions of the different programs included in each suite. I will indicate what operating system I am using, how I will set up Windows Explorer to manage class files, the different ways to rename a file folder and, the difference between the “Save” and “Save As” functions and why it is important. Upon completion of this paper the user a basic understanding of the Windows Operating System, File Management and the Differences and requirements of the two versions and respectable programs in each. DIFFERENCES BETWEEN VARIOUS VERSIONS AND BRIEF DESCRIPTION OF VARIOUS APPLICATIONS DIFFERENCES BETWEEN VARIOUS VERSIONS AND BRIEF DESCRIPTION OF VARIOUS APPLICATIONS Microsoft PowerPoint is a widely used presentation graphics program which enables the user to create effective presentations using on screen slides, slide presentations or overheads. There are many functions of PowerPoint which include, editing and formatting text, inserting graphics and pictures, and using pre-designed templates. Preparing each......

Words: 689 - Pages: 3

Free Essay

File Formats

...Video File Formats 3GPP Multimedia File (3gp) | Is a multimedia container format defined by the Third Generation Partnership Project (3GPP) for 3G UMTS multimedia services. It is used on 3G mobile phones but can also be played on some 2G and 4Gphones. | Advanced Systems Format File (asf) | File format that wraps various content bit streams; data types can include audio, video, script command, JPEG-compressed still images, binary, and other streams defined by developers. This description is focused on the use of the format for audio and video. | Audio Video Interleave File (avi) | Is a multimedia container format that can contain both audio and video data in a file container that allows synchronous audio-with-video playback. Like the DVD video format, AVI files support multiple streaming audio and video, although these features are seldom used. | Flash Video File (flv) | Is container file format used to deliver video over the internet using Adobe Flash Player version 6-11. | iTunes Video File (m4v) | Is a video format and file extension extremely resembling traditional and common MP4 (MPEG-4 Video File). M4V video file format is developed by Apple Inc., who uses it to flag as a video file and attach it to iTunes, by encoding TV episodes, movies, and music videos in the iTunes Store under official DRM copy protection. | Apple QuickTime Movie (mov) | Is a common multimedia format often used for saving movies and other video files, using a proprietary compression......

Words: 1237 - Pages: 5

Free Essay

Managment

...called bankrupt if they failed to pay their loans on time; I say that if a company has assets then they should not be considered bankrupt since they can sell these assets and pay the people back. 3- there are some criteria in order to be called bankrupt Your income should be less than or equal to a certain amount You should not have applied for bankruptcy in the past 180 days. Clear Channel Communications Dictionary defines bankruptcy as legally declared insolvency, or inability to pay creditors, and the term bankrupt is derived from the Italian banca rotta, which means broken bank. There are two kinds of bankruptcy: One when the company itself or the individual declares it which is called voluntary bankruptcy, and one when creditors file a bankruptcy petition against a debtor which is called “involuntary bankruptcy”. Facts and Tools Question 1 A Question 4 A. Cyclical B. Structural C. Frictional Question 6 Insider who have jobs so they can have rights and making it harder for the company to fire them Thinking and problem solving Question 1 A) Rise B) Fall C) Fall D) Rise E) Stay the same Question 2 Net job creation= 5.25-5= 0.25 Total job destruction/net job creation= 5/0.25=20 So for each 20 job destructed one job are created Question 8 Of course the economist is right because he is an economist. The U.S government measure unemployment by how many people are unemployed and are actually looking for jobs not for how many people who are......

Words: 291 - Pages: 2

Premium Essay

Managment

...been waiting for computing technology to catch up — Statisticians already doing “manual data mining” — Good machine learning is just the intelligent application of statistical processes — A lot of data mining research focused on tweaking existing techniques to get small percentage gains 14 7 Common Uses of Data Mining — Direct mail marketing — Web site personalization — Credit card fraud detection — Gas & jewelry — Bioinformatics — Text analysis — SAS lie detector — Market basket analysis — Beer & baby diapers: 15 Definition: Predictive Model — A “black box” that makes predictions about the future based on information from the past and present Age Blood Pressure Eye Color Model Will the patient Will customer file respond to this new bankruptcy (yes/no) medication? — Large number of inputs usually available 16 8 Models — Some models are better than others — Accuracy — Understandability — Models range from “easy to understand” to incomprehensible — Decision trees — Rule induction — Regression models — Neural Networks Harder Easier 17 Scoring — The workhorse of data mining — A model needs only to be built once but it can be used over and over — The people that use data mining results are often different from the systems people that build data mining models — How do you get a model into the hands of the person who will be using it? — Issue: Coordinating data used to build model and the data scored by that model —......

Words: 3180 - Pages: 13

Premium Essay

Managment of Information

...System database to save time in searching through the organization’s database and data warehouses. External information: some decisions require input from external sources of information. Various branches of federal government, Dow Jones, Compustat data, and the internet, to mention just a few, can provide additional information for the use with a Decision Support System. Personal information: you can incorporate your own insights and experience your personal information into your Decision Support System. You can design your Decision Support System so that you enter this personal information only as needed, or you can keep the information in a personal database that is accessible by the Decision Support System.anagment Model managment The model management component consists of both the Decision Support System models and the Decision Support System model management system. A model is a representation of some event, fact, or situation. As it is not always practical, or wise, to experiment with reality, people build models and use them for experimentation. Models can take various forms. Businesses use models to represent variables and their relationships. For example, you would use a statistical model called analysis of variance to determine whether newspaper, TV, and billboard advertizing are equally effective in increasing sales. Decision Support Systems help in various decision-making situations by utilizing models that allow you to analyze information in many......

Words: 1830 - Pages: 8

Premium Essay

File

...at it is very cheaper rates than traditional proposal and can also significantly so lower than all over IT expenses, at the same time that will for us very convenient and scalable charging models have to appears and that making that cloud even look more attractive. Convenience and continuous availability: The cloud service offers to public cloud service that are available whenever the end-user may be locate that he can access. This representation enables easily can access to information and helps the needs of users in different time zone or different place and geographic locations also that we can access, if we see side benefit, explain booms since it is very easier than ever to access we also view and modification shared documents and files. Increased storage capacity: The cloud computing can supports or accommodates and store huge more data if we compare to a personal computer this offers almost to store unlimited for storage capacity, it supports us don’t worries about running out of storages space & at the same time that we can store huge data. Backup and recovery: In this backup and recovering data is stored into cloud and not on physical device. And sometimes the clouds itself backup the data from the local computers. And it is flexible and easy in providing the backup and recovery services. Disadvantages of cloud computing: Slow speed: It takes longer duration while uploading and downloading of large data from the cloud. Security and privacy: If we talk......

Words: 762 - Pages: 4

Free Essay

File

...disabilities who Additional single copies of this document may be ordered from: USDA Forest Service Missoula Technology and Development Center 5785 Hwy. 10 West Missoula, MT 59808-9361 Phone: 406–329–3978 Fax: 406–329–3719 Internet: wo_mtdc_pubs@fs.fed.us For additional technical information, contact Wes Throop at the address above. Phone: 406–329–3957 Fax: 406–329–3719 Internet: wthroop@fs.fed.us Lotus Notes: Wesley Throop/WO/ USDAFS An electronic copy of this document is available on the Forest Service’s FSWeb Intranet at: http://fsweb.mtdc.wo.fs.fed.us require alternative means for communication of program information (Braille, large print, audiotape, and so forth) should phone USDA’s TARGET Center at (202) 720-2600 (voice and TDD). To file a complaint of discrimination, write: USDA, Director, Office of Civil Rights, Room 326-W, Whitten Building, 14th and Independence Avenue SW, Washington, DC 20250-9410, or call (202) 720-5964 (voice or TDD). USDA is an equal opportunity provider and employer. ...

Words: 1965 - Pages: 8

Free Essay

Managment

...Mission, Vision, Values, & Managment In today's post-recession workforce, gaining employment is so difficult that once hired, life has new meaning. The mission, vision, and values may mean different things to managers. With a closer look into an organization, from the newest employees up to the experienced senior management, it is found that many of the staff members do not have knowledge enough to recall the mission and vision statement. The military is used as an example, setting the standard for other public and private entities. In this case, let's examine a human resources unit in the United States Air Force. The Air Force Civilian Services mission and vision statement aim to "provide elite administrative, operation and technical support for the Air Force vision; Global vigilance, reach, and power" ('Our Mission & Vision', 2016). The mission and vision statement must work together to meet the organizational goals. In examining the core competencies, one must consider the true definition and rationale. Also, the Air Force has a set of strategic goals that determine the long-range direction of the organization. The attitudes, behaviors and goals of each Air Force civilian in the group are meant to demonstrate alignment with the vision, mission, values, and competencies. For a company to manifest values and a culture that leads to success, these vital mantras must be reiterated, exercised, memorized, and done by all employees. Mission Statment There is a......

Words: 1493 - Pages: 6