Permissions in Computer System? Here is the complete guide for beginners
Permissions in Computer system - a deep and practical
guide for beginners
Permissions are the backbone
of the computer system. They decide who is allowed to access specific resources,
perform actions and etc.
In this blog, we are going
to learn about the concept of permission in details, including their types and importance
in system security.
Permissions are basically implement on operating system. To understand this concept better, you can read our detailed guide on Operating System (Windows, Linux, macOS). Click Here to Learn.
What are permissions?
So basically permissions are
a set of rules, rights and regulations that define that what action and process
are going to perform in a computer system. In short it’s mean to giving
permission to user, app or system to perform any kind of task.
In permission, the thing
which is decided is:
- Which resources user
can access
- How much control a
user gets over those resources
- Which data or resources
user use
Purpose of permission is to
make the computer system secure, stop unauthorized access and maintain the
confidentiality, integrity and availability of data.
Permission basically
implement in multiple things like operating system, data bases, mobile
applications and MIS etc.
Why permissions are important
The main objective of
permission is to secure the system, controlled each and every access and proper
use of resources.it is important for maintain security, protection of data and
ensure only authorized users can get access.it also helps organizations to
protect sensitive organizational data, Prevent unauthorized access and Maintain
system stability.
Permissions are important because:
- No one can access
confidential data
- Modify/ delete
important files
- No one can misuse or
hacked system resources
It also support CIA triad:
- Confidentiality:
Only authorized and trusted users can view data
- Integrity:
Only permitted users can modify data
- Availability:
Resources remain accessible to valid users
Types of permissions
User permission
In user permission, defines what
kind of task a user allows to perform in a computer system. Permission are
assigned to user based of several things like job role, responsibilities and
organizational hierarchy.
For example:
In an organization
- User 1 gets Read-only
access
- User 2 gets Read and
update access
- User 3 gets Full
system control
User gets some common
permissions like Installing or uninstalling software, Creating or deleting user
accounts, access of file folder and log in to system.
File & folder permission
In file and folders
permissions, it can be decided who can read, write or execute files which
stored in a computer system.
File & Folder
permissions are typically connected with how data is organized inside the computer
system’s storage hierarchy. Learn more detail about File system structure in
Operating Systems.
Basic file & folder
permissions are:
- Read (R) – User can
only open and view the file & folder
- Write (W) – User can
only modify or delete the file & folder
- Execute (X) – User can run the file or folder as a program
In Linux operating system, file permissions are structured according to the computer system internal design and architecture. For better understanding, explore our article Linux Architecture
App permission
Applications require
permissions to access different system resources. These permissions involve camera, microphone,
location, contacts, storage etc.
If an application requests unnecessary
permissions, it can be Privacy violation, Security threat, and Malware risk.
System permission
These are high level
permissions, what admin can do?
- Install or update the
operating system install on computer
- Install or remove any
kind of software
- Create, modify, or
delete user accounts easily
- Change security and
system settings
On the other hand Normal
users do not have administrative permissions to prevent system damage or
perform any task which is related to admin.
Interview questions to remember
Define permissions
in an information system?
Answer:
Permissions are a set of rules, rights and
regulations that define that what action and process are going to perform in a
computer system.
Why are
permissions important in computer system?
Answer:
Permissions are important because:
- No one can access
confidential data
- Modify/ delete
important files
- No one can misuse or
hacked system resources
Define the
basic file permissions?
Answer:
The Basic file & folder permissions are:
- Read (R) – User can
only open and view the file & folder
- Write (W) – User can
only modify or delete the file & folder
- Execute (X) – User
can run the file or folder as a program
Do u know
about the Principle of Least Privilege?
Answer:
In Principle of Least Privilege states that a user
should be given only the minimum level of access required to perform their job
and task.
What
problems can occur due to incorrect permissions in computer system?
Answer:
Incorrect permissions can cause multiple problems
which effects computer system, includes Data leakage , Accidental file deletion,
Malware spread, System instability ,Legal issues and many more, that’s why
proper permission is require for any kind of task.
How do admin
manage permissions in an organization?
Answer:
Administrators manage permissions by proper
management like:
- Creating user accounts
- Assigning roles and tasks
- Setting file and folder access rights to user
- Monitoring access logs regularly
- Regularly reviewing and updating permissions
They ensure users only access resources necessary
for their work.
Define the administrative
permissions?
Answer:
Administrative permissions provide full control
over the computer system. An admin can install software’s, changes system
settings, manage users, configure security policies etc.
Explain
about application permissions?
Answer:
Application permissions basically allow
applications to access system resources like Camera, Microphone, Storage, Location
etc.
Tell
something about permission auditing?
Answer:
Permission auditing typically involves monitoring
and reviewing access logs to track which user use what data.
How can you
handle a situation where an employee has excessive permissions?
Answer:
I can handle this situation by:
1. Review their role and job requirements clearly
2. Apply the Principles of Least Privilege
3. Remove unnecessary permissions if not require
4. Document the changes
5. Monitor system logs regularly for any unusual activity
Conclusion
We can say permissions are
the core part of Information technology and management information system. They
control the limit of each user, system reliability, protects sensitive data,
ensure systems run smoothly. The permission management is essential for organizational
security, efficiency, and system stability. Understand the concept of
permission is important for every IT student, as it is the foundation of system
security and access control.
Do You know Permissions also control how background
processes and services access computer system resources. To understand this
concept, read our topic of Process Vs Services Explained.

Comments
Post a Comment