ABSTRACT

Introduction The implementation of access control in most environments has not changed much over the years. Access decisions are often left to the discretion of the information owner. Access control lists are used to distinguish which users will be granted access to a directory and / or a file within the directory, and what level of permissions these users will have in relation to the data being accessed. The availability of files stored on the network is ensured through backups. This represents the last line of defense against maliciously altered or deleted files. Automation of these previously manual controls does not entirely protect data from tampering or loss. Access controls must be properly set, otherwise information may be inappropriately copied or removed from a system, often without the knowledge of the information owner. Backups must be periodically checked to make sure that all target files were archived. Human interactions with these and other elements of a system can result in losses when activities are not conducted properly.