USD ($)
$
United States Dollar
Euro Member Countries
India Rupee
د.إ
United Arab Emirates dirham
ر.س
Saudi Arabia Riyal

File Systems, Users, Permissions & Access Controls

Lesson 10/37 | Study Time: 20 Min

File systems, users, permissions, and access controls are fundamental components of operating systems that govern how data is stored, accessed, and secured.

A file system organizes and manages files on storage devices, while users represent identity entities interacting with these files. Permissions define what actions different users can perform on files and directories, and access controls enforce these rules to ensure data confidentiality, integrity, and availability.

File Systems

A file system provides a structured way to store and retrieve data on storage media such as HDDs, SSDs, USB drives. Common file systems include NTFS (Windows), ext4 (Linux), FAT32, and exFAT. It keeps track of files, directories, metadata (creation date, size, etc.), and space allocation. They organize data into hierarchical trees of directories and subdirectories for easy navigation.

Users in Operating Systems 


Permissions

Permissions specify what actions a user or group can perform on files/directories. The standard permissions are Read (view contents), Write (modify contents), and Execute (run a file or navigate a directory). Permissions can be assigned separately to the Owner, Group, and Others (everyone else).

For example, a file's permissions might allow the owner full access, the group read-only access, and others no access. Windows uses Access Control Lists (ACLs) for granular permissions; Linux uses a simpler model based on rwx bits and ACLs.

Access Controls

Access control methods determine how permissions are enforced and managed.


1. Discretionary Access Control (DAC): Users control access to their owned files. Common in Windows and Unix systems.

2. Mandatory Access Control (MAC): Central policy controls access, often used in high-security environments (e.g., SELinux).

3. Role-Based Access Control (RBAC): Access is granted based on user roles within organizations, simplifying management.


Access controls ensure that users only have the minimum necessary privileges, enforcing the principle of least privilege to reduce risks.

Special Permissions and Advanced Concepts 


Managing Permissions

Managing permissions is essential for maintaining system security and ensuring users have the appropriate level of access. The following points highlight important considerations for effective permission management:


1. Both Windows and Linux provide command-line and graphical tools to view and modify permissions (e.g., chmod, chown on Linux; Properties dialog, icacls on Windows).

2. Permissions must be audited regularly to maintain security posture and comply with organizational policies.

3. Automated tools and policy frameworks assist in enforcing consistent permissions across complex environments.

Jake Carter

Jake Carter

Product Designer
5.00
Profile

Class Sessions

1- What is Ethical Hacking? Purpose, Scope & Limitations 2- Types of Hackers 3- Cyber Kill Chain & Basic Attack Lifecycle 4- Legal & Ethical Considerations (Laws, Permissions, Responsible Disclosure) 5- Basics of Networking (IP, MAC, Ports, Protocols) 6- OSI & TCP/IP Models 7- Common Network Devices & Architectures (Routers, Switches, LAN/WAN) 8- Understanding Firewalls, NAT & Basic Packet Flow 9- Operating Systems Overview 10- File Systems, Users, Permissions & Access Controls 11- Introduction to Web Applications (HTTP/HTTPS, Cookies, Sessions) 12- Client vs Server Architecture Basics 13- Types of Recon (Passive vs Active) 14- Footprinting Techniques (DNS lookup, WHOIS, Website & Metadata Analysis) 15- Basic Scanning Tools Overview 16- Identifying Publicly Exposed Information & Attack Surface Basics 17- Vulnerability, Threat, Exploit: Definitions & Differences 18- Common Vulnerabilities: Misconfigurations. Default Credentials, Weak Passwords ,and Unpatched Software 19- Social Engineering Basics 20- Basic Malware Categories 21- Port Scanning Basics (Open/Closed/Filtered Ports) 22- Network Mapping Essentials 23- Service & Version Enumeration Concepts 24- Identifying Common Services (HTTP, FTP, SSH, SMB) 25- Password Security Essentials (Strength, Hashing Concepts, Common Weaknesses) 26- OS Weaknesses 27- Network Weaknesses 28- Basics of Web Vulnerabilities 29- Security Hardening Fundamentals (System, Network, User Practices) 30- Patch Management & Configuration Hygiene 31- Secure Password & Authentication Practices 32- Basic Network Security Controls (Firewalls, IDS/IPS—concept only) 33- Safe Browsing & User Awareness Essentials 34- Documenting Findings 35- Communicating Risks to Non-Technical Stakeholders 36- Responsible Disclosure Process 37- Ethical Hacker Code of Conduct