File access system

Name:

Professor:

Course:

Date:

SEC 1 

File access system

File system accesses systems are critical for protection of files through access retraction which allows the specific uses to access and read files, allow others to access read and edit files and totally restrict others from accessing the file. This depends on the authorization set up (Fitzpatrick et al). Below is a design for accessing (reading and writing or making changes) on file F by user A.

<Location /svn/calc>

SVNPath /var/svn/calc

SVNReposName “Calculator Application”

[calc:/branches/calc/bug-F]

A= r

This will allow use A to access file F.

<Location /svn/calc>

SVNPath /var/svn/calc

SVNReposName “Calculator Application”

[calc:/branches/calc/bug-F]

A= rw

This will allow use A to access file F read, make changes and save the changes.

Sensor Location

The location of sensors in wireless networks is influenced by several factors (Boo & Jadhav, 12). First is the physical security of the sensors. Sensors must be locate in areas where they are protected from physical damage, for instance, the can be locate in areas under view of security cameras. Second, the range of sensors in relation to surrounding facilities such as walls and door is also significant. The range of sensors varies depending on the location of people within a facility. In this regard sensors should be positioned in a manner that ensures that their ranges overlap by 20% at least (Information Assurance Tools Report).

Density function and probability of an event

Set of density functions

Suppose there is 1 actual intrusion for every 1000 authorized users, and the overlapping area covers 1% of the authorized users and 50% of the intruders, the density function will be as follows:

F(x)=P(X≤x)

P(x=A) ={1/4 A=a{1/2 A=b{1/4 A=c

.

This is not an unreadable depiction

This is unreliable depiction since it mean that the probability of an intrusion occurring is 0.0001yet in the intrusion area

Probability that an event that occurs in this region is that of an authorized user

Since there are 1000 user and the area covers only 1% which is 10 users. Yet 50% of intruders are concentrated in this area, then probability of an event occurring in the area will be as follows:

50% of intrusion is= 0.00005, (ie 50% 0.0001).

10 users = 0.00005 probability

The probability of an event occurring is 0.00005/10 = 0.000005

Work Cited

Boo, Sneha & Jadhav, Priyanka. “Wireless Intrusion Detection System.” International Journal of Computer Applications 5:8 (2010): 9-14.

Fitzpatrick, Brian. Pilato, Michael., & Sussman, Ben. “Intrusion Path-Based Authorization.” Web. September 10, 2012 < http://svnbook.red-bean.com/en/1.7/svn.serverconfig.pathbasedauthz.html>

Information Assurance Tools Report. “Intrusion Detection Systems” 2009. Web. September 10, 2012 <http://iac.dtic.mil/iatac/download/intrusion_detection.pdf>

Detection

Systems