Types of Permissions and Security Principles

Different Types of Permissions

  • Read Permissions

    • Definition: Allows a user to view or read a file without making any modifications.
  • Write Permissions

    • Definition: Allows a user not only to read a file but also to modify or edit its contents.
  • Execute Permissions

    • Definition: Allows a user to run a program or script contained within a file.
  • Delete Permissions

    • Definition: Permits a user to remove a file from the system.
  • Role of Network Administrators

    • Responsibility: Network administrators are responsible for setting different permissions for files, usually tailored to who needs to access them, ensuring appropriate access control.

Principle of Least Privilege

  • Definition of Least Privilege

    • This is a fundamental principle of security that dictates that an individual, program, or process should be allocated the minimum rights, privileges, and access to information necessary to perform its function.
    • It is also referred to as the "principle of least privilege".
  • Practical Application

    • Users are granted only the access required to perform their job responsibilities, which minimizes potential security risks.
    • Access controls are designed with the concept of implicit denial, meaning that access is denied by default unless explicitly granted.

Types of User Accounts

  • Administrators

    • Description: Special accounts that have comprehensive access and can do virtually anything on the entire system.
    • Examples: In Windows and macOS systems, these are referred to as Administrators, while in Linux, this role is commonly held by the Root User.
  • Standard Users

    • Description: These accounts have limited permissions compared to Administrators and typically cannot add new users or change system-wide settings.
    • Functionality: They can perform regular tasks and access their files and applications but are restricted from administrative tasks that could affect system integrity.