UNIT II. Controlling Files
UNIT II. Controlling Files
Controlling Files
Introduction
Data sharing poses a problem: If people can look at some information on a computer,
how do we prevent them from seeing all the information? This is the same problem as RAM
protection. If any user can read any information inside the computer, we can’t prevent users
from reaching any of its contents.
For most people, their most important assets reside in their files. Modern file systems
keep the hard drive organized and give us a way to reliably locate and save our data. All
modern systems use a hierarchical directory to organize files into groups. The directory forms
an inverted tree growing from the topmost directory, called a root directory. Many users think of
files as living in file folders instead of directories. In this chapter, we look at access control
mechanisms used to protect larger-scale resources like files and folders.
Learning Outcomes
At the end of this chapter, you should be able to:
1. Learn the file system and apply the file access rights.
2. Examine the structure of executable files and viruses.
3. Identify the goals and basic policies for file protection and sharing.
4. Comprehend the file security control based on “permission flags”.
directories.
Waledac – spreads through email – creates a botnet that spreads spam and more
malware.
Conficker or Downadup – spread through Internet via Windows vulnerabilities – created
a botnet used for spam and malware distribution.
Pushdo/Cutwail – A botnet and spam package that used to produce 7 million messages
a day.
ZeuS – creates botnet focused on financial fraud
Stuxnet – attacks control logic in industrial plants; probable target was Iranian nuclear
sites
Policy Alternatives
• Global Policies – applied to all users by default
– Isolation Policy – keep users separate
– Sharing Policy – let users share their files
• Tailored Policies
– Modify rights for specific sets of files
– Specific tailorings
• Privacy – block some files from sharing
• Shared reading – share some blocked files
• Shared updating – full rights for some users
Underlying Policy on Shared System
• Our policy must make it possible for users to share application programs.
– Three policy statements below allow this while defending against related risks.
Bob’s Policy
• Bob perceives another risk:
– 6. Unauthorized access to client data
• To address this, he adds this requirement:
Security Controls
• An operating system can protect files as long as:
1. The OS protections are always applied when we access our files, and
2. There is no way to bypass the OS protections
• Basic Principle: Deny by Default
1. We always start by granting no access
2. We add access rights
3. This makes it easier to assign the right permissions and achieve Least Privilege
Information States
• Data or information may be in these basic states
– Storage state
• Stored in a computer, not being processed
• “Data at rest”
– Processing state
• Being used by an active process
• Usually stored in RAM
– Transmission state
• Being moved from one place to another (“Data in motion)
Instruction: Answer the following by discussing concisely. Please write your answer in a
separate sheet of short paper. (5 points each)
1. Explain the role of a file name and path in locating a file on a hard drive and give
reasons why user should protect a file from a read or write access by other users.
2. Search on the internet for information on different malware packages, like those
discussed on the text. Find a description of a malware package not described in the text.
Provide the following information
a. What is the malware called?
b. How does it propagate?
c. What does it do to the computer?
3. Identify the objectives and policies for file protection and sharing.
4. Bob would like to be able to look at files in the “Suitemates” folders without having to log
in as Suitemates. Take this steps to create a security plan to achieve this goal.
a. Create a revised policy to reflect this objective.
b. Draw a diagram illustrating access rights that implement this policy.
c. Create a table of compact access rules that implements the revised policy. Use
the format shown in table 3.5.
Reference
Richard E. Smith. Elementary Information Security 2’nd Edition: Controlling Files. Jones and
Barlett Publishers, Inc. (19, April 2015).