In this chapter, we look at access control mechanisms used to protect larger-scale resources like files and folders. The chapter focuses on these topics:

  Overview of file system technology

  Structure of executable files and viruses

  Goals and basic policies for file protection and sharing

  File security controls based on “permission flags”

3.1     The File System

Data sharing poses a problem: If people can look at some information on a computer, how do we prevent them from seeing all the information? This is the same problem as RAM protection. If any user can read any information inside the computer, we can’t prevent users from reaching any of its contents.

For most people, important ...

Get Elementary Information Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.