+ All Categories
Home > Documents > Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access...

Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access...

Date post: 18-Jan-2016
Category:
Upload: antonia-strickland
View: 223 times
Download: 0 times
Share this document with a friend
Popular Tags:
19
Chapter 8 File System Security
Transcript
Page 1: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Chapter 8

File System Security

Page 2: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

File Protection Schemes

• Login passwords• Encryption• File Access Privileges

Page 3: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Figure 8.1 The process of encryption and decryption

Page 4: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

File Access Rights• Types of Users:– Owner– Group– All/Other

• Types of Permissions:– Read– Write– Execute

• Types of Files– Directories– Other files

Page 5: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Table 8.1 Summary of File Permissions in LINUX

Page 6: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Directory Permissions

• read = list files in the directory• write = add new files to the directory • execute = access files in the directory

Page 7: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Determining File Access Rights

Page 8: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Table 8.2 Permission Values

Page 9: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Table 8.3 Permissions for Access to courses, labs, and temp

Page 10: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Changing the Access Rights

Purpose – to set/change permissions in files

• chmod [options] octal-mode filelist• chmod [options] symbolic-mode filelistOptions• -R recursively process subdirectories

Page 11: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Table 8.4 Values for Symbolic Mode Components

Page 12: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Table 8.5 Examples of the chmod Commands and Their Purposes

Page 13: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Table 8.5 Examples of the chmod Commands and Their Purposes

Page 14: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Figure 8.2  Position of file type and access privilege bits for LINUX files

(as seen by “ls –l” command)

Page 15: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Figure 8.3  Position of access privilege bits for LINUX files as specified in the chmod

command

Page 16: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Default File Access Rights

• umask is a bitmap which tells which permissions to deny by default on new files

• 022 = 000 010 010 (deny write for g+o) rwx r-x r-x (new files permissions)

• umask with no parameters returns the current mask value

• umask newmask - sets new mask• umask command usually used in a startup file

Page 17: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

SUID Bit

• A special permission bit that allows executable files to run using the privileges of the owner of the files rather than the user of the file

• Can be set using commands:chmod u+s filelist

chmod 4xxx filelist• Shows up in ls - l in place of the user x bit as an s

if the file is executable - (rwsrwxrwx) • Very dangerous to use

Page 18: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

SGID Bit

• A special permission bit that allows executable files to run using the privileges of the owner’s group rather than the user of the file

• Set using the commandschmod g+s filelistchmod 2xxx filelist

Page 19: Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.

Sticky Bit• A special bit that can be used as follows:• For a file: it directs the operating system to keep the

program in memory if possible after it finishes execution (Early versions of UNIX)

• For a directory: it sets it up such that only the owner of the directory can delete (or rename) files from the directory, even if other users have write privilege (tmp)

• Can be set using the chmod command using the options:chmod +t filelist

• Shows up in “ls –l” as a t - (rwxrwxrwt)


Recommended