{"id":50011,"date":"2024-04-26T23:22:44","date_gmt":"2024-04-26T23:22:44","guid":{"rendered":"http:\/\/localhost\/branding\/file-access-system\/"},"modified":"2024-04-26T23:22:44","modified_gmt":"2024-04-26T23:22:44","slug":"file-access-system","status":"publish","type":"post","link":"https:\/\/sheilathewriter.com\/blog\/file-access-system\/","title":{"rendered":"File access system"},"content":{"rendered":"<p>\ufeffName:<\/p>\n<p>Professor:<\/p>\n<p>Course:<\/p>\n<p>Date:<\/p>\n<p>SEC 1\u00a0<\/p>\n<p>File access system<\/p>\n<p>File system accesses systems are critical for protection of files through access retraction which allows the specific uses to access and read files, allow others to access read and edit files and totally restrict others from accessing the file. This depends on the authorization set up (Fitzpatrick et al). Below is a design for accessing (reading and writing or making changes) on file F by user A.<\/p>\n<p>&lt;Location \/svn\/calc&gt;<\/p>\n<p>  SVNPath \/var\/svn\/calc<\/p>\n<p>  SVNReposName &#8220;Calculator Application&#8221;<\/p>\n<p>[calc:\/branches\/calc\/bug-F]<\/p>\n<p>A= r<\/p>\n<p>This will allow use A to access file F.<\/p>\n<p>&lt;Location \/svn\/calc&gt;<\/p>\n<p>  SVNPath \/var\/svn\/calc<\/p>\n<p>  SVNReposName &#8220;Calculator Application&#8221;<\/p>\n<p>[calc:\/branches\/calc\/bug-F]<\/p>\n<p>A= rw<\/p>\n<p>This will allow use A to access file F read, make changes and save the changes.<\/p>\n<p>Sensor Location<\/p>\n<p>The location of sensors in wireless networks is influenced by several factors (Boo &amp; Jadhav, 12). First is the physical security of the sensors. Sensors must be locate in areas where they are protected from physical damage, for instance, the can be locate in areas under view of security cameras. Second, the range of sensors in relation to surrounding facilities such as walls and door is also significant. The range of sensors varies depending on the location of people within a facility. In this regard sensors should be positioned in a manner that ensures that their ranges overlap by 20% at least (Information Assurance Tools Report). <\/p>\n<p>Density function and probability of an event <\/p>\n<p>Set of density functions<\/p>\n<p>Suppose there is 1 actual intrusion for every 1000 authorized users, and the overlapping area covers 1% of the authorized users and 50% of the intruders, the density function will be as follows:<\/p>\n<p>F(x)=P(X\u2264x)<\/p>\n<p>P(x=A) ={1\/4 A=a{1\/2 A=b{1\/4 A=c<\/p>\n<p>.<\/p>\n<p>This is not an unreadable depiction<\/p>\n<p>This is unreliable depiction since it mean that the probability of an intrusion occurring is 0.0001yet in the intrusion area<\/p>\n<p>Probability that an event that occurs in this region is that of an authorized user<\/p>\n<p>Since there are 1000 user and the area covers only 1% which is 10 users. Yet 50% of intruders are concentrated in this area, then probability of an event occurring in the area will be as follows: <\/p>\n<p>50% of intrusion is= 0.00005, (ie 50% 0.0001). <\/p>\n<p>10 users = 0.00005 probability  <\/p>\n<p>The probability of an event occurring is 0.00005\/10 = 0.000005<\/p>\n<p>Work Cited<\/p>\n<p>Boo, Sneha &amp; Jadhav, Priyanka. \u201cWireless Intrusion Detection System.\u201d International Journal of Computer Applications 5:8 (2010): 9-14.<\/p>\n<p>Fitzpatrick, Brian. Pilato, Michael., &amp; Sussman, Ben. \u201cIntrusion Path-Based Authorization.\u201d Web.  September 10, 2012 &lt; http:\/\/svnbook.red-bean.com\/en\/1.7\/svn.serverconfig.pathbasedauthz.html&gt;<\/p>\n<p>Information Assurance Tools Report. \u201cIntrusion Detection Systems\u201d 2009. Web. September 10, 2012 &lt;http:\/\/iac.dtic.mil\/iatac\/download\/intrusion_detection.pdf&gt;<\/p>\n<p>Detection<\/p>\n<p>Systems<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ufeffName: Professor: Course: Date: SEC 1\u00a0 File access system File system accesses systems are critical for protection of files through<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-50011","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>File access system - sheilathewriter<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sheilathewriter.com\/blog\/file-access-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"File access system - sheilathewriter\" \/>\n<meta property=\"og:description\" content=\"\ufeffName: Professor: Course: Date: SEC 1\u00a0 File access system File system accesses systems are critical for protection of files through\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sheilathewriter.com\/blog\/file-access-system\/\" \/>\n<meta property=\"og:site_name\" content=\"sheilathewriter\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T23:22:44+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/file-access-system\/\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/file-access-system\/\",\"name\":\"File access system - sheilathewriter\",\"isPartOf\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\"},\"datePublished\":\"2024-04-26T23:22:44+00:00\",\"author\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\"},\"breadcrumb\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/file-access-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sheilathewriter.com\/blog\/file-access-system\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/file-access-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sheilathewriter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"File access system\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/\",\"name\":\"sheilathewriter\",\"description\":\"Custom essay writing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/opskill.com\/propapers\"],\"url\":\"https:\/\/sheilathewriter.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"File access system - sheilathewriter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sheilathewriter.com\/blog\/file-access-system\/","og_locale":"en_US","og_type":"article","og_title":"File access system - sheilathewriter","og_description":"\ufeffName: Professor: Course: Date: SEC 1\u00a0 File access system File system accesses systems are critical for protection of files through","og_url":"https:\/\/sheilathewriter.com\/blog\/file-access-system\/","og_site_name":"sheilathewriter","article_published_time":"2024-04-26T23:22:44+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sheilathewriter.com\/blog\/file-access-system\/","url":"https:\/\/sheilathewriter.com\/blog\/file-access-system\/","name":"File access system - sheilathewriter","isPartOf":{"@id":"https:\/\/sheilathewriter.com\/blog\/#website"},"datePublished":"2024-04-26T23:22:44+00:00","author":{"@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab"},"breadcrumb":{"@id":"https:\/\/sheilathewriter.com\/blog\/file-access-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sheilathewriter.com\/blog\/file-access-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sheilathewriter.com\/blog\/file-access-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sheilathewriter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"File access system"}]},{"@type":"WebSite","@id":"https:\/\/sheilathewriter.com\/blog\/#website","url":"https:\/\/sheilathewriter.com\/blog\/","name":"sheilathewriter","description":"Custom essay writing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/opskill.com\/propapers"],"url":"https:\/\/sheilathewriter.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/50011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/comments?post=50011"}],"version-history":[{"count":0,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/50011\/revisions"}],"wp:attachment":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/media?parent=50011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/categories?post=50011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/tags?post=50011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}