Types of Permissions and Security Principles
Different Types of Permissions
Read Permissions
- Definition: Allows a user to view or read a file without making any modifications.
Write Permissions
- Definition: Allows a user not only to read a file but also to modify or edit its contents.
Execute Permissions
- Definition: Allows a user to run a program or script contained within a file.
Delete Permissions
- Definition: Permits a user to remove a file from the system.
Role of Network Administrators
- Responsibility: Network administrators are responsible for setting different permissions for files, usually tailored to who needs to access them, ensuring appropriate access control.
Principle of Least Privilege
Definition of Least Privilege
- This is a fundamental principle of security that dictates that an individual, program, or process should be allocated the minimum rights, privileges, and access to information necessary to perform its function.
- It is also referred to as the "principle of least privilege".
Practical Application
- Users are granted only the access required to perform their job responsibilities, which minimizes potential security risks.
- Access controls are designed with the concept of implicit denial, meaning that access is denied by default unless explicitly granted.
Types of User Accounts
Administrators
- Description: Special accounts that have comprehensive access and can do virtually anything on the entire system.
- Examples: In Windows and macOS systems, these are referred to as Administrators, while in Linux, this role is commonly held by the Root User.
Standard Users
- Description: These accounts have limited permissions compared to Administrators and typically cannot add new users or change system-wide settings.
- Functionality: They can perform regular tasks and access their files and applications but are restricted from administrative tasks that could affect system integrity.