+ All Categories
Home > Documents > Chapter 8

Chapter 8

Date post: 05-Jan-2016
Category:
Upload: early
View: 31 times
Download: 0 times
Share this document with a friend
Description:
Chapter 8. File System Security. File Protection Schemes. Login passwords Encryption File Access Privileges. Figure 8.1 The process of encryption and decryption. File Access Rights. Types of Users: Owner Group All/Other Types of Permissions: Read Write Execute Types of Files - PowerPoint PPT Presentation
Popular Tags:
19
Chapter 8 File System Security
Transcript
Page 1: Chapter 8

Chapter 8

File System Security

Page 2: Chapter 8

File Protection Schemes

• Login passwords• Encryption• File Access Privileges

Page 3: Chapter 8

Figure 8.1 The process of encryption and decryption

Page 4: Chapter 8

File Access Rights• Types of Users:– Owner– Group– All/Other

• Types of Permissions:– Read– Write– Execute

• Types of Files– Directories– Other files

Page 5: Chapter 8

Table 8.1 Summary of File Permissions in LINUX

Page 6: Chapter 8

Directory Permissions

• read = list files in the directory• write = add new files to the directory • execute = access files in the directory

Page 7: Chapter 8

Determining File Access Rights

Page 8: Chapter 8

Table 8.2 Permission Values

Page 9: Chapter 8

Table 8.3 Permissions for Access to courses, labs, and temp

Page 10: Chapter 8

Changing the Access Rights

Purpose – to set/change permissions in files

• chmod [options] octal-mode filelist• chmod [options] symbolic-mode filelistOptions• -R recursively process subdirectories

Page 11: Chapter 8

Table 8.4 Values for Symbolic Mode Components

Page 12: Chapter 8

Table 8.5 Examples of the chmod Commands and Their Purposes

Page 13: Chapter 8

Table 8.5 Examples of the chmod Commands and Their Purposes

Page 14: Chapter 8

Figure 8.2  Position of file type and access privilege bits for LINUX files

(as seen by “ls –l” command)

Page 15: Chapter 8

Figure 8.3  Position of access privilege bits for LINUX files as specified in the chmod

command

Page 16: Chapter 8

Default File Access Rights

• umask is a bitmap which tells which permissions to deny by default on new files

• 022 = 000 010 010 (deny write for g+o) rwx r-x r-x (new files permissions)

• umask with no parameters returns the current mask value

• umask newmask - sets new mask• umask command usually used in a startup file

Page 17: Chapter 8

SUID Bit

• A special permission bit that allows executable files to run using the privileges of the owner of the files rather than the user of the file

• Can be set using commands:chmod u+s filelist

chmod 4xxx filelist• Shows up in ls - l in place of the user x bit as an s

if the file is executable - (rwsrwxrwx) • Very dangerous to use

Page 18: Chapter 8

SGID Bit

• A special permission bit that allows executable files to run using the privileges of the owner’s group rather than the user of the file

• Set using the commandschmod g+s filelistchmod 2xxx filelist

Page 19: Chapter 8

Sticky Bit• A special bit that can be used as follows:• For a file: it directs the operating system to keep the

program in memory if possible after it finishes execution (Early versions of UNIX)

• For a directory: it sets it up such that only the owner of the directory can delete (or rename) files from the directory, even if other users have write privilege (tmp)

• Can be set using the chmod command using the options:chmod +t filelist

• Shows up in “ls –l” as a t - (rwxrwxrwt)


Recommended