Linux Users, Groups, and Permissions Lab

Linux Users, Groups, and Permissions Lab

Objective:

Understand how to create user accounts
Understand how to create group accounts
Creating good password policies
Understanding permissions and file sharing

Setup:

You will need a Ubuntu Server VM

Walk Through:

You are a system administrator who has been tasked to create user accounts for new users on your system. You can pick whatever theme you like as long as there are protagonist and antagonist users:  i.e. Super Hero’s and Villains, Harry Potter Characters, or other interests of yours.

Create 2 groups:
One for the Protagonists
One for the Antagonists

Create 5 users:
2 Protagonists
2 Antagonists
1 Neutral – Can access both group’s files

User Configuration:
Each user will have their own home directory that only they can access.
Users must change their password when they first log in.
Users are required to change their password after 6 months.

Required Directories in /home:
1. Share – Anyone can access this directory to add or remove
2. Protagonists – Only the protagonists group can add or remove
3. Antagonists – Only the antagonists group can add or remove
***Directory names can be named based on your current theme***

Ensure that you test that each account is working by either switching users, or logging in as different users.

What to Submit:
Submit a lab report documenting your process.

Make sure to include:

  • A screenshot of the listing of the /home directory of the system showing the users home directories and the additional group directories.
  • A screenshot showing the listing of the file /etc/groups.
  • Screenshots that shows the permissions of the protagonists and antagonists directories.
  • Output from the chage -l for each of the five users.

Upon Completion You Should:

  • Be able to use user management commands to create and modify users
  • Be able to use group management commands to create and modify groups
  • Be able to modify permission to allow individuals access based on group or permissions level

Wk#5 Research paper And Discussion

1.    

Research Paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

2.

Discussion Week 5: Wireless Networking

 What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.   (350-400 words)

discussion

 

Consider  the mean of a cluster of objects from a binary transaction data set.  What are the minimum and maximum values of the components of the mean?  What is the interpretation of components of the cluster mean? Which  components most accurately characterize the objects in the cluster?

 Please ensure to cite the Author, YYYY with any content brought into the discussion.

Data incident

Pick a data incident in the news; it can be one of the well-known or smaller incidents(Zoom would be great).   Create a plan to show how you would respond and describe some risk-mitigating items that if they were in place may have stopped this incident. (3-4 pages)

vulnerability

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

write in 300words.

Assignment

 

To  successfully run any business or operation, one must have and utilize a  business strategy. Company leaders utilize business strategies  to achieve their organizational goals (Jamsa, 2013). The author lists  seven plans that may comprise an organization’s business strategy.

(1) List FIVE of Jamsa’s plans that business executives may use to achieve their business goals. 

(2) In 450 – 600 words (excluding Title Page and Reference List), explain some possible benefits of using EACH of the FIVE plans you choose and possible issues if each plan is not used.

  • List each of the five plans as a Level 1 Heading
  • Title page required
  • Abstract required
  • Write in third-person only
  • Proper APA 7 referencing is required 
    • in-text citation
    • References List

assignment-8

 Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.