|
All network operating systems have some means of controlling access to
resources. The file system is a key resource on any workstation or
server. Protecting that file system from unauthorized access and
allowing access as needed are key components in a comprehensive
security policy. This chapter provides some guidelines for an overall
security policy, which includes file system security. UNIX file system
security concepts are introduced and examples are provided showing how
to apply them. You will learn how to determine file and directory
permissions and discover what types and categories of permission
exist. We will analyze the meaning of the various permission types in
terms of user and group access. You will work with directory and file
permissions using the command line and CDE to determine and change
file and directory permissions.
|
|