Tools: Linux Learning Journey – Day 12: File Permissions & Ownership in Ubuntu 🐧🔐
Source: Dev.to
After understanding how to inspect users and groups on Day 11, Day 12 focused on one of the most critical security concepts in Linux: file permissions and ownership. In Linux, everything is a file—and controlling who can read, write, or execute those files is fundamental to system security, stability, and access control. 🔹 Why File Permissions Matter In real-world systems—especially servers and cloud environments—incorrect file permissions can lead to: Linux solves this with a simple yet powerful permission model. 🔹 Understanding Linux File Permissions Each file or directory has three permission types: - r (read) – View file contents or list directory
- w (write) – Modify file contents or directory entries
- x (execute) – Run a file or access a directory And these permissions apply to three entities: - User (owner)
- Group
- Others 🔹 Commands I Learned & Practiced
🔸 ls -l — View File Permissions Used to display detailed file information, including: - Permission bits
- Owner
- Group
- File type This command helped me read and interpret permission structures clearly. 🔸 chmod — Change File Permissions Used to modify permissions using: - Symbolic mode (u+r, g-w, o+x)
- Numeric mode (755, 644, etc.) This made it clear how Linux translates numbers into access control. 🔸 chown — Change File Owner Used to change the user ownership of files and directories. - Application deployments
- Service accounts
- Log and config file access 🔸 chgrp — Change Group Ownership Used to assign files to specific groups, enabling s*hared access without exposing files publicly*. Commonly used in team-based environments. 🔸 umask — Default Permission Control Learned how umask defines default permissions for newly created files and directories. - Security-by-default setups
- Preventing overly open permissions ✔️ What This Helped Me Understand Day 12 strengthened my understanding of Linux security fundamentals. I now feel confident in: File permissions are not just a Linux concept—they are a security mindset. 🔑 Control access. Protect data. Build secure systems. Consistency remains the real superpower 💪🐧 Templates let you quickly answer FAQs or store snippets for re-use. Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink. Hide child comments as well For further actions, you may consider blocking this person and/or reporting abuse - Unauthorized access
- Application failures
- Security vulnerabilities
- Data loss or corruption - How Linux enforces access control at the file level
- How permissions protect system and user data
- How ownership affects application behavior
- Why permission issues are a common root cause of errors
- How to debug “Permission denied” problems efficiently - Reading and modifying file permissions
- Managing file ownership correctly
- Using umask for secure defaults
- Troubleshooting permission-related issues
- Applying best practices in real-world systems