ABOUT THIS CHAPTER
In this chapter, we work with the mechanisms provided by operating systems like Unix and Windows to protect files and folders. We also take a technical look at the fifth phase of the security process: monitoring the system. The chapter focuses on these topics:
• Tailoring the security policy to grant special access to individuals or groups
• Permission flags in Unix-like systems
• Access control lists in Macintosh and Windows systems
• Monitoring system events through logging
4.1 Controlled Sharing
In Section 3.3, we chose between Bob’s isolation policy and a “share everything” policy. What happens if Bob needs to share files with one or two other users but not with the rest of the suite? ...