A firm with an UNIX scheme with capacity to support 5000 users on the system may experience security problem on accessibility of a file when dealing with less number of users. The firm has a file that is restricted from access among 10 users. There two approaches that can be applied to protect UNIX scheme to ensure that only 4990 users have access to the file. The goal of protecting the scheme is accomplish by setting up access control groups and list. The organization can also seek other solutions that are more useful in protection of scheme rather than use UNIX security solution.
to controlling access for users and groups the first method in protecting scheme using Unix system to allow 4990 users access the required file is creating access control list. Arguably, an access control list allow users gain control on the file permission rather that the general UNIX file permission. As a result, access control list allow higher file security that control file permission for groups, owner groups, users and owners. In addition, access control list offers the ability to establish default permission for all users that are enlisted in the system. File protection offered by UNIX allow users to write, read and execute permission for the system users, groups and owner. In ensuring that 10 users do not have access to the specified file the firm is required to develop an access control list with user names and passwords for the 4990 user with an access to the file (Pfleeger & Pfleeger, 2003, p. 615).
Another way of ensuring that only 4990 user have access to a specified file is to set up a group that has an access. The idea of the group in UNIX system is associated with permission of access placed on the file and directories to control users writing, reading and executing a file or write and search through directories and files. Each user access the UNIX system must be user and group and in some cases can be a member of several groups. Every group has a group identification and name to allow members access the file. The administrator of the UNIX system may use groups to control and manage groups accessing file for the purpose of allowing users write, read and execute defined files, devices and directories. For example, the firm should create a group of the 4990 users and provide permissions to members in these groups. However, some systems limit groups making the firm unable to fully use the UNIX scheme.
There is an alternative approach that seek to establish a more efficient approach of improving protective schemes offered by UNIX in provide the 4990 users the accessibility to the file. The most effective approach toaccomplish the task is the application of access control list. Every user logs into the system with a universal permission to the file whenever the name is enlisted on the access control. The firm must develop an access control list that deny 10 users the access to the file (Pfleeger& Pfleeger, 2003, p. 756).
There are two approaches of controlling the access of the UNIX system among users including the establishment of access control list to permit users gain control on the file permission and denying the access among users.
Pfleeger, C. P., & Pfleeger, S. L. (2003). Security in computing. Upper Saddle River, NJ: Prentice Hall PTR.