Premium Essay

Ok Ntfs

In:

Submitted By waida91
Words 692
Pages 3
Access control
Basic concepts

Access control
• What can you do after authentication? • ”The prevention of unauthorized use of a

resource, including the prevention of use of a resource in an unauthorized manner”
 (ITU-T Recommendation X.800)

AC concepts reference makes monitor request user or represented 
 subject by ”principal” process, method, 
 code…

Authorization decision

read, write, delete, create…

object file, memory, device, process, method, code… protected 
 entity

is granted access (or not)

active entity

Auth… what?
• Authentication: who made the request? • Authorization: is the subject authorized/ trusted to perform the operation?

• Basic: observe, alter – very abstract, good for modeling

Access operations

• Concretely: depend on context & implementation ‣ memory: read, write, execute

Examples, experience?

‣ files: … append, delete, change properties ‣ methods: … invoke, create, delegate…

Access control matrix
Matrix A subjects s in S bjorn amendra lila4711 rast1337

objects o in O assignment.txt read, write read read solution.txt read, write read grades.xls read, write read, write -

s has right r on o if r in A[s,o] (define rights needed for each operation)

rights R

Matrix implementation bjorn adriaan lila4711 rast1337 assignment.txt read, write read read solution.txt read, write read grades.xls read, write read, write -

Now consider 104 users, 107 files? Large, sparse matrix: impractical to implement (but useful as a model)

Capability Lists (CL) bjorn amendra lila4711 rast1337 assignment.txt read, write read read solution.txt read, write read grades.xls read, write read, write -

Row-wise: each subject s has {A[s,o], o in O} Must be unforgeable (cf tickets) and protected. May be passed to other subject (delegation).
Capability ≈ qualification, competence, capacity

Similar Documents

Premium Essay

Ok Ntfs

...Access control Basic concepts Access control • What can you do after authentication? • ”The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner”
 (ITU-T Recommendation X.800) AC concepts reference makes monitor request user or represented 
 subject by ”principal” process, method, 
 code… Authorization decision read, write, delete, create… object file, memory, device, process, method, code… protected 
 entity is granted access (or not) active entity Auth… what? • Authentication: who made the request? • Authorization: is the subject authorized/ trusted to perform the operation? • Basic: observe, alter – very abstract, good for modeling Access operations • Concretely: depend on context & implementation ‣ memory: read, write, execute Examples, experience? ‣ files: … append, delete, change properties ‣ methods: … invoke, create, delegate… Access control matrix Matrix A subjects s in S bjorn amendra lila4711 rast1337 objects o in O assignment.txt read, write read read solution.txt read, write read grades.xls read, write read, write - s has right r on o if r in A[s,o] (define rights needed for each operation) rights R Matrix implementation bjorn adriaan lila4711 rast1337 assignment.txt read, write read read solution.txt read, write read grades.xls read, write read, write - Now consider 104 users, 107 files? Large, sparse matrix: impractical...

Words: 692 - Pages: 3

Free Essay

Testout

...select Local Server from the menu on the left. 7. Next to NIC Teaming click the Disabled link to configure NIC Teaming. 8. In the Teams panel, select Tasks > New Team. 9. Type the team name and select the adapters to be included in the team. 10. Click Additional Properties and configure as required. Click OK. 11. In Network and Sharing Center, click Change adapter settings. 12. Right-click the NIC Team adapter and select Properties. 13. Select Internet Protocol Version 4 (TCP/IPv4) and click Properties. * Select Use the following IP address and enter the configuration information recorded previously. * Select Use the following DNS server addresses and enter the DNS information recorded previously. 14. Click OK. 15. Click Close.      Configure 192.168.0.10 for the IP address      Configure 255.255.255.0 for the subnet mask      Configure 192.168.0.5 for the gateway      Configure 198.28.56.108 and 163.128.78.93 for the DNS server addresses 799.66 GB total space     Total volume size: 1400 GB (800 GB Disk 1 + 600 GB Disk 2)      Use 600 GB from Disk 2      Assign drive letter M      Use NTFS File System      Create the Data volume      Create a Spanned volume Explanation To complete this lab, be aware of the following: * You can only extend a volume on a basic disk onto contiguous free space on the same disk. * You can only extend the System volume on the same disk. * A spanned volume uses space...

Words: 1683 - Pages: 7

Free Essay

Disk Partitions

...Disk Partitions Disk Partitions An internal hard disk ( PATA, SATA, or SCSI) cannot be used until it is prepared for use. There are two steps involved in preparing a hard disk: Step 1. Creating partitions and logical drives Step 2. Formatting partitions and logical drives ( which assigns drive letters) A disk partition is a logical structure on a hard disk drive that specifies the following: ¦ Whether the drive can be bootable ¦ How many drive letters ( one, two, or more) the hard disk contains ¦ Whether any of the hard disk’s capacity is reserved for a future operating system or other use Although the name “ disk partition” suggests the drive is divided into two or more logical sections, every PATA, SATA, and SCSI hard disk must go through a parti-tioning process, even if you want to use the entire hard disk as a single drive letter. All versions of Windows support two major types of disk partitions: Primary— A primary partition can contain only a single drive letter and can be made active ( bootable). Only one primary partition can be active. Although a single physical drive can hold up to four primary partitions, you need only one primary partition on a drive that contains a single operating system. If you in-stall a new operating system in a dual- boot configuration with your current op-erating system, a new version of Windows can be installed in a different folder in the same drive, or can be installed in an additional primary partition. If you want to use a non- Windows...

Words: 2878 - Pages: 12

Free Essay

Is3340

...Introduction Course: IS3340 Week: 1 Lab: Using NTFS to Secure Files and Folders Assignment In this lab you will use NTFS and share permissions to control access to files and folders. Story You're part of the IT support team in the New York office of a nationwide travel services company called USA Travel. You have three other offices in Dallas, San Francisco, and Chicago. All the offices have a separate Windows 2003 Active Directory domain. The domain for the New York office, the root domain for the organization, is named usatravel.com. One afternoon you receive a call from Larry Drake, one of the two sales supervisors in your office. He and the other sales supervisor, Marta Vasquez, both have new Windows XP Professional computers, and they've created a few folders structures on both computers to hold important files. They'd like you to come to their desks and set whatever permissions you need to make sure their sales employees have the different levels of access they'll need to the folders. He then proceeds to give you the following information. There are two sales teams. The first team, led by Larry himself, has two members: Cindy Williamson and Lew Ferrell. The second team, led by Marta Vasquez, also has two members: Tammy Dobson and Juanita Dawson. The Sales department also has an administrative assistant named Markie Chung. The network administrator for your office created three security groups (which you later find out are domain local groups) for the Sales department...

Words: 2606 - Pages: 11

Free Essay

Ntfs and Hyperv

...NTFS AND HYPER V The New Technology File System (NTFS) is the standard file structure for the Windows NT operating system. It is used for retrieving and storing files on the hard disk. The NTFS introduced a number of enhancements, including innovative data structures that increased performance, improved metadata, and added expansions like security access control, reliability, disk space utilization, and file system journaling. The NTFS replaced the OS/2 High-Performance File System and the Windows 95 file allocation table (FAT), which was used in MS-DOS and earlier operating system versions. NTFS is also used with Windows 2000, Windows XP, and Windows Server 2003.NTFS was initially designed for the Intel i860 XR processor released by Microsoft in 1993. Although IBM and Microsoft worked together to create the graphical operating system known as the OS/2, they disagreed on many important issues and they eventually separated. IBM continued to work on the OS/2, while Microsoft started working on Windows NT. The OS/2 HPFS had many new features that were also used with Windows NT. Both HPFS and NTFS share the same disk partition identification type code (07), which is unusual because there are dozens of codes available. The new reliable features of the NTFS include a fault tolerance system that automatically repairs hard drive errors without error messages. The NTFS also retains detailed transaction records that keep track of hard drive errors. This feature is beneficial in...

Words: 651 - Pages: 3

Free Essay

Microsoft Windows File Systems

....................................................................... 4 FAT16 (16-bit)....................................................................................................................... 4 FAT32 (32-bit)....................................................................................................................... 5 HIGH PERFORMANCE FILE SYSTEM (HPFS)................................................................ 5 NEW TECHNOLOGY FILE SYSTEM (NTFS).................................................................... 5 CONCLUSION.......................................................................................................................... 6 APPENDIXES............................................................................................................................ 7 Appendix A: File Allocation Table (FAT) Bit and Usage (Figure 1).................................... 7 Appendix B: FAT and NTFS File System Comparison (Figure 2)........................................ 8 REFERENCES.......................................................................................................................... 9 Microsoft Windows File Systems      The management and organization of information is vital to the...

Words: 1524 - Pages: 7

Free Essay

Linux Unit 5

...First, let us analyze what file sharing in a centralized storage area on a server means. It means that basically when you store a file it will be stored in a predetermined place on a server instead of on the system. Now let us analyze what file replication is. File replication would be the server backing up by replicating to another server. Both of these are extremely helpful services provided by servers. How are these beneficial services increasing the ease of administration? Well, all of the different users will be storing their work to the server. That means they can login and access their files from any workstation on the local network. So I have come up with some examples showing different scenarios where this would be helpful. Example 1: As a student, if all of your files were being stored on a server you could login from any computer and access your files allowing for great mobility. Example 2: This one isn’t about a local network but I felt it was a great example anyway. When your access your e-mails they are stored on a server. Allowing you to login from anywhere and access the mail. Also, you can send yourself attachments so that you can access them at any time from any place. Example 3: Say you work in a lab and you want to do an experiment. You could search the server to find helpful information from other people’s work that is being shared. All of these examples benefit from replication as well. These servers replicating which would be backing up to the other servers...

Words: 492 - Pages: 2

Premium Essay

Nt1230 Lab 2

...2 GB partition you created earlier in this exercise? It is the second partition listed, Partition 2. 2. Why does the command not execute properly? It does not execute properly because Partition 2 is in FAT32 format, and therefor is not supported. 3. How much available shrink space can be found in the volume? There are 19283 MB, or 19 GB of available shrink space. 4. How is the the resulting volume different from the one you created in Exercise 2.1? Explain Why. Volume Y has less storage space than Volume X. This is due to the amount of space of Volume Y being entered in MB, after having expanded and shrunk Volume X to a size larger than its original size. Also, Volume Y was created in NTFS format, whereas Volume X was created in FAT 32, and then converted to NTFS format. 5. Why were you able to extend the Alice2 volume, but not the Alice1...

Words: 443 - Pages: 2

Premium Essay

Windows Os File System Comparsion

... |Operating System | |FAT12 |All Versions of MS DOS | |FAT16 |All Versions of MS DOS | |FAT32 |DOS v7 and Higher, Windows 98, Windows ME, Windows 2000, Windows XP, Windows 2003 | | |Server, Windows Vista, Windows 7 | |exFAT |Windows CE 6.0, Windows Vista SP1, Windows 7, Windows XP w/KB955704 | |NTFS |Windows NT, Windows 2000, Windows XP, Windows 2003 Server, Windows 2008, Windows Vista, | | |Windows 7 | |NTFS5...

Words: 1183 - Pages: 5

Premium Essay

Security Scan

...(10-12-2013 11-44 AM) Scan date: 10/12/2013 11:44 AM Scanned with MBSA version: 2.1.2112.0 Catalog synchronization date: Security Updates Scan Results Issue: Security Updates Score: Unable to scan Result: Computer has an older version of the client and security database demands a newer version. Current version is and minmum required version is 5.8.0.2678. Operating System Scan Results Administrative Vulnerabilities Issue: Local Account Password Test Score: Check not performed Result: Password checks are not performed on a domain controller. Issue: File System Score: Check passed Result: All hard drives (1) are using the NTFS file system. Detail: | Drive Letter | File System | | C: | NTFS | Issue: Password Expiration Score: Check failed (non-critical) Result: Some user accounts (4 of 10) have non-expiring passwords. Detail: | User | | Administrator | | Guest | | Instructor | | Student | | SUPPORT_388945a0 | Issue: Guest Account Score: Check passed Result: The Guest account is disabled on this computer. Issue: Autologon Score: Check passed Result: Autologon is not configured on this computer. Issue: Restrict Anonymous Score: Check passed Result: Computer is properly restricting anonymous access. Issue: Administrators Score: Check failed (non-critical) Result:...

Words: 582 - Pages: 3

Premium Essay

Music

...Sequential Data Files 8 In this chapter, we will introduce the important concept of a data file and discuss the use of sequential files for data input. We will also describe how to manipulate the records in these files in several ways. After reading this chapter, you will be able to do the following: Identify the types of data files [Section 8.1] Identify records and fields within a data file [Section 8.1] Create, write data to, and read data from a sequential file [Section 8.1] Delete, modify, and insert records in a sequential file [Section 8.2] Use arrays for file maintenance [Section 8.2] Merge two data files so that their records stay in order [Section 8.3] Use the control break processing technique in certain programming situations [Section 8.4] Combine many techniques learned so far—data files, arrays, searching, and sorting—to create a longer program [Section 8.5] ISBN 1-256-14455-X 405 Prelude to Programming: Concepts and Design, Fifth Edition, by Stewart Venit and Elizabeth Drake. Published by Addison-Wesley. Copyright © 2011 by Pearson Education, Inc. 406 Chapter 8 Sequential Data Files In the Everyday World Data Files You probably write information you need to remember on little scraps of paper all the time, and that’s good enough for a lot of things. But if you try to run a business that way, you’ll find yourself in trouble because you’ll have a difficult time locating the data you need to pay bills, employees, and suppliers. If you...

Words: 12582 - Pages: 51

Free Essay

340 Case Study

...Solutions to an Expanding Business: The Story of AΩ TechInc Abstract Alpha Omega Technical Industries (ΑΩ TechInd) has come to the point where substantial company growth has caused them to be extended well beyond their headquarters located in Los Angeles, California. The growth of ΑΩ TechInd has landed them in a position to where they need to serve numerous divisions positioned around the globe. Technical and network issues such as; data storage, access, and security are areas that AΩ TechInd must address in order for their industry to be able to support their growth. The purpose of this paper will provide details in order to reach a solution on an ever growing demand of storage requirements for ΑΩ TechInd. Solutions to an Expanding Business: The Story of AΩ TechInc A network can be defined as “a group of two or more computers which are connected in such a way that they can exchange information (or share data) with one another” (Strong, Heer, and Lane, 2012). Since the creation of ΑΩ TechInd, the business has reached high levels of success and is worldwide renowned. ΑΩ TechInd also supports numerous divisions in many cities around the globe such as; Miami, Frankfort, Rio de Janeiro, Dubai, and Shanghai. Because of the major growth that ΑΩ TechInd had achieved, the business’s network in return must also expand in order to sustain the transactions of data and support other information that may occur on a day to day basis. In order for ΑΩ...

Words: 1553 - Pages: 7

Free Essay

System Preformance

...System Performance 1. Search the internet for information about the effects of a fragmented file system on disk performance. Individual file fragmentation occurs when a single file has been broken into multiple pieces (called extents on extent-based file systems). While disk file systems attempt to keep individual files contiguous, this is not often possible without significant performance penalties. File system check and defragmentation tools typically only account for file fragmentation in their "fragmentation percentage" statistic. 2. Search the internet for information about how process load and the number of running processes affect system performance. The more things you have running the slower your system goes. 3. Search the internet for information about how adding more motherboard RAM improves virtual memory performance. It's been proven that adding more memory to a computer system increases its performance. If there isn't enough room in memory for all the information the CPU needs, the computer has to set up what's known as a virtual memory file. In so doing, the CPU reserves space on the hard disk to simulate additional RAM. This process, referred to as "swapping", slows the system down. In an average computer, it takes the CPU approximately 200ns (nanoseconds) to access RAM compared to 12,000,000ns to access the hard drive. 4. Provide an explanation of the factors that affect performance in a windows computer system and how to improve its performance...

Words: 400 - Pages: 2

Free Essay

Mlo Woorksheet

...Lab 26 Configuring File REcovery options ------------------------------------------------- This lab contains the following exercises and activities: Exercise 26.1 | Using File History | Lab Challenge | Configuring the Advanced Settings of File History | Exercise 26.1 | Using File History | Overview | In this exercise, you will restore a file that is saved in File History. | Mindset | File History is an alternative to Windows 7 File Recovery. It allows for files backed up on previous versions of Windows to be recovered. | Completion time | 20 minutes | Question 1 | According to what's shown on-screen, which feature must be disabled before you can use File History? | 14. Take a screen shot of the File History window by pressing Alt+Prt Scr and then paste it into your Lab 26 worksheet file in the page provided by pressing Ctrl+V. [copy screen shot over this text] Lab Challenge | Configuring the Advanced Settings of File History | Overview | In this exercise, you will configure File History to copy files in specified folders to a File History drive every 30 minutes and keep the files for one month. You will also increase the size of the offline cache to 10% of disk space. | Mindset | Windows offers various methods to back up and recover data files. File History can be configured to automatically copy files to a specified location. Then File History can be used to access an earlier versions of the files. | Completion time | 10 minutes | ...

Words: 309 - Pages: 2

Free Essay

Bym Bym Bym

...In this report, I going to focus 3 methods for partitioning the hard disk and also explain the advantages for the methods. It going to make the hard disk to be better organized, more productive and ensure our integrity of data. Organizing the works Safeguarding the data Boosting computer's performance Organizing the works This method can make your computer to without worrying about losing work when things go wrong. We can just easily use System Restore if something goes wrong. We can find our data quickly and keep it organized. Other that moves suspended or inactive projects to another partition until we need them or until they're ready to be archived to the partition. Defragmentation of Data partition will be more quickly, which further reduces potential downtime. Safeguard the data This helps us to protect our work from disappearing should when physical disk fail. We can copy the subfolder from my Data partition to a new subfolder that we created in the partition. Name the new subfolder in partition by date or project which is easy to be recognize. Keeping the date or name in subfolder helps us more easily find something that we was working on a few days ago in case we need to restore an earlier version of a document or file Boosting computer's performance Although we got a not high-performance computer but its performance can be improved by a good partitioning scheme. The biggest boost comes from the Paging. I Move the paging file to 1 place. A well-known...

Words: 714 - Pages: 3