UNIX is an operating system parallel to the Windows and DOS operating systems. UNIX offers the facility for multiple users accessing the system at one time. Ken Thompson, Dennis Ritchie, and few others were the first developers at AT&T of the UNIX operating system. They developed a set of tools that were present in the system, and were able to perform a limited number of actions but with precision. The C-programming language of the system allowed for compatibility with the PDP-11, and UNIX could then be used on a computing platform. In the late 1970’s and 1980’s, UNIX developed a standardized program to cater the needs for the academic world. AT&T tried to outsource the operating system to third party vendors, but they were unsuccessful and ended up selling their rights in UNIX to Novell in 1990.
When UNIX was first developed it was not aimed towards the academia. However, their popularity grew amongst the academic users, as it allowed them to add their own tools and share them with their peers. The UNIX philosophy is a culmination of several concepts including; plain text for data storage, devices and certain IPC’s are treated as files, usage of multiple software tools, and some others. Today, UNIX servers are not only used in computers, but they are also found in mobile devices. The internet and the networking system have been largely influenced by the UNIX operating system. The UNIX system gained its popularity due to several major reasons that include; direct interaction, giving businesses greater control and privacy, AT&T gave the software at a minimal cost, use of inexpensive hardware, and the portability.
As the UNIX system supports multiple users it is not surprising that 5000 users are given access to a common file. However, due to certain reasons if 10 of the 5000 users are to be restricted to the access of a particular file, then there are ways to do this. In many organizations, some files are confidential and do not have to be shared with everyone. The UNIX operating system allows the controllers to limit the access of particular files to whoever they want. There are two useful methods that the users may adopt to restrict the access of the 10 users. One method would be to create an access control list of the 4990 users who are to be given access. These ACL’s allow the users in the list to control that specific information. If for instance; James is added to the list and is allowed to edit the files then simply add (James, delete), this would give James the authority to delete the files. Another method would be to create a group with the 4990 users. Then the accessibility of the group can be set according to the requirements of the firm. However, in some cases the users are restricted by the system; therefore, this method of creating a group of the 4990 people may not be effectively implemented. The restriction of the user groups is essential because at times firms do not want everyone to be able to make changes to the data.
UNIX provides another method to protect the data and may be more effective than the aforementioned methods. The universe access information would have to be implemented. Through this method all users would be equal as far as their access controls are concerned. If the firm feels some users are to be given greater control then it is mentioned in these system prerequisites. Consequently, the name of the ten users who are not given access to this information; their names are added to the list with no access privileges. This is a more convenient method rather than adding the names of 4990 users to an access control list.