CT320

Three headers follow: ! Long name of class !! Semester !!! New Chapter 4, replaced by the name of the current page.

CT320: Network and System Administration

Fall 2013

New Chapter 4

Links to the various pages for this class:

Wish I could do this: * Schedule

See this page as a slide show

Access Control and Root

Original slides from Dr. James Walden at Northern Kentucky University. Access Control

Access Control

https://en.wikipedia.org/wiki/Access_control

Control Mechanisms

Control Mechanisms

System Access

Access Commands

Filesystem Protection

Protection Commands

    drwxr-----  5 applin fac 4096 Aug 22 10:35 Desktop
    drwxr-xr-x 13 applin fac 4096 Aug 21 16:57 Documents
    drwx------  3 applin fac 4096  Sep 2  2013 Cheaters
    $ chown applin Desktop
    $ chgrp fac Desktop
    $ chmod 755 foo
    $ chmod ug+rw bar

Protection Commands

More on Permissions

ACLS

Features of an access control list (ACL)

Linux ACL support

Linux can support ACL mode

Process Ownership

    $ ls –l /bin/passwd
    -rwsr—xr—x 1 root root 25000 Feb 8 2011 passwd

Root Privileges

A special root account exists that represents the omnipotent administrative user, often called the superuser account, that can perform tasks that are restricted to other users:

Root Privileges

Several ways exist in which root privileges can be accessed, and a number of concerns should be taken into account when deciding which method to use:

Root

Access Control Problems

Common Extensions

Modified: 2013-09-06T12:35

User: Guest

Check: HTML CSS
Edit History Source
Apply to CSU | Contact CSU | Disclaimer | Equal Opportunity
Colorado State University, Fort Collins, CO 80523 USA
© 2015 Colorado State University
CS Building