0% found this document useful (0 votes)
201 views

File Sharing and Protection OS2

ppt that explains file sharing and protection

Uploaded by

AP Tequinecle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
201 views

File Sharing and Protection OS2

ppt that explains file sharing and protection

Uploaded by

AP Tequinecle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

File Sharing and

Protection in
Operating
Systems
OVERVIEW OF FILE SHARING METHODS, SECURITY, AND
PROTECTION MECHANISMS IN OPERATING SYSTEMS.
Introduction

 File sharing allows


users and processes to
access files efficiently,
while file protection
ensures data security.
Operating systems
manage file sharing
and protection using
permissions,
encryption, and access
control methods.
- Multiple users
1. Local File can access
Sharing: shared folders or

File directories.

Sharing - NFS, SMB, FTP,

in OS
and cloud storage
services (e.g.,
2. Remote File
Dropbox, Google
Sharing:
Drive) enable
remote access
across systems.
To prevent data corruption
during concurrent access:

Concurrency - Locking Mechanisms


Control (Advisory and Mandatory)

- Read/Write Permissions
control access levels for
users and processes.
File Protection in OS

File Access

File Permissions: Access Control Lists


• - Define read, write, and (ACLs):
execute rights for users, • - Provide more granular
groups, and others. access control beyond
basic permissions.
 1. File Encryption:

Encryption
- Protects file contents from
unauthorized access. and
 - Tools: BitLocker (Windows),
FileVault (macOS), LUKS
Security
(Linux)

 2. Disk Encryption:
 - Ensures all data on a drive is
encrypted.
User Authentication &
Security Policies
1. Authentication Methods:

- Passwords, multi-factor
authentication, biometrics.

2. Security Policies:

- Mandatory Access Control


(MAC): OS-enforced policies.

- Discretionary Access Control


(DAC): User-defined permissions.
File Sharing and
Protection in Different OS
- SMB for sharing;
NTFS permissions and
1. Windows:
BitLocker for
protection.

- NFS for sharing; UNIX


2. Linux/UNIX: permissions, ACLs, and
LUKS for protection.

- SMB/AFP for sharing;


3.macOS: FileVault for encryption
and UNIX permissions.
File mounting is the process of making
File a storage device or file system
MOUNTING accessible to operating system. It
connects the device to a directory
(Linux/macOS) or a drive letter
(Windows), allowing users and
programs to interact with the device's
files. For example, in Linux, the mount
command is used to attach
devices to a directory, while in
Windows, Disk Management
handles drive assignments.

You might also like