In this chapter, we work with the mechanisms provided by operating systems like Unix and Windows to protect files and folders. We also take a technical look at the fifth phase of the security process: monitoring the system. The chapter focuses on these topics:
■ Tailoring the security policy to grant special access to individuals or groups
■ Permission flags in Unix-like systems
■ Access control lists in Macintosh and Windows systems
■ Monitoring system events through logging