Introduction
Permissions is a significant process that has to be enhanced with the use file management and enhancement in an organization. There is a need to review the strategies and the technical avenues that have been put in place to have a secure system. This paper will focus on the security and permission oversight for a medium-sized company.
One important concept that will need to be known and enacted in the organization is to have file/folder permissions within the organization. The file and folder permissions will enable the managers and the owners of the files to protect the contents of the files and the folders. File and folder permissions will ensure that the authorized people will be able to access the contents of the folders and file (Chowdhury, Adam, Wu, Rofrano, & Boutaba, 2014). Having file and folder permission will mean that the authorized people will have the rights and the credentials that they will use to access the folder/file. By having these credentials, they will be able to access the files and folders.
There is also a need to have business unit resource segregation. This is a strategy where users have different rights to a resource. Different users will have different access rights to a resource. It will be important to have procedures that will enable the users to access the resources with different access levels. With the use of resource access segregation, the access of data and information by unauthorized people will be avoided and eliminated in the case (Parkinson, S., & Hardcastle, 2014).
One strategy that I would use is to have an assessment of the segregation. I would first give the structure of the business resource and the people who access the business resource. By giving the managers the people who have access to the business resource that they would like to access, the business unit leaders will appreciate the fact that not all business resources are used in its entirety. Most of the business unit leaders use one part of the resource. I will convince them that it is important to have the business unit leaders to access the parts that they will use in their lines of duty. The strategy would be to look at the plan in terms of the cost of the plan. By having a comparison of the different methods, it will be easy to convince the managers on the plan because it is easy to implement and cheaper when compared to other strategies that can be used.
The use of NTFS file and folder permission is one of the most important feature that has been developed. One reason to use the NTFS permissions for files and folders is that it enables the business unit leaders to have access control. They are able to manage the people who will access the files. Another reason is that the unauthorized personnel can be kept at bay. They will not be able to access the files and the folders which have been protected by NTFS permissions. The third reason for this is that in case a user/manager makes a critical mistake while they are operating on the files and folders, they will have to grant the permission for the action to take place. Having NTFS permissions, dangerous actions like delete will be kept in moderation and controlled.
The plan that would be useful in this case is to have all users put under some category. With the use of active directory, the separation of the users will be made possible in the entire operation of the files. There will also be the creation of Group Policy object after the users have been categorized into groups.
References
Chowdhury, S. R., Adam, C., Wu, F., Rofrano, J., & Boutaba, R. (2014, May). Managing the file system from the kernel. In Network Operations and Management Symposium (NOMS), 2014 IEEE (pp. 1-8). IEEE.
Parkinson, S., & Hardcastle, D. (2014). Automated Planning for File System Interaction.
Shafiei, B. M., Iranmanesh, F., Iranmanesh, F., Branch, B., & Bardsir, I. (2012). Review NTFS Basics. Australian Journal of Basic and Applied Sciences, 6(7), 325-338.
Zhi-hui, L. (2013). The Security Encrypted File Based on NTFS. Information Security and Technology, 4, 016.