CHAPTER        4


In this chapter, we work with the mechanisms provided by operating systems like Unix and Windows to protect files and folders. We also take a technical look at the fifth phase of the security process: monitoring the system. The chapter focuses on these topics:

•  Tailoring the security policy to grant special access to individuals or groups

•  Permission flags in Unix-like systems

•  Access control lists in Macintosh and Windows systems

•  Monitoring system events through logging

4.1 Controlled Sharing

In Section 3.3, we chose between Bob’s isolation policy and a “share everything” policy. What happens if Bob needs to share files with one or two other users but not with the rest of the suite? ...

Get Elementary Information Security now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.