Changing ownership of files and folders

Assignment Help Computer Network Security
Reference no: EM133015764

Access Control and Files System Security

Description: This manual is for running experiments on Access Control and Files System Security.

In the first exercise, you will setup the file hierarchy structure and the user accounts on a Kali Linux environment. In the second exercise, students will use chmod command to change file and directory permission to demonstrate the slight differences in permissions for files and directories.

Third exercise is on changing ownership of files and folders and fourth exercise focuses on file permissions and Group access control.

Pre-work:
1. Launch Virtual Box
2. Launch your Kali
3. Do all your exercises in the VM

Exercise 1: Setting up File Structure and User space

The objective of this exercise is to setup the file hierarchy structure and the user accounts that are required for the exercises in this section. The su command is used to switch users.

1. Login as root
2. Use useradd command to create two new users user1 and user2 as follows:
a. useradd user1 -g users
b. useradd user2 -g users
3. Check user information with the id command. Note the uid, gid for each output.
a. id user1
b. id user2
4. Create directory structure
a. mkdir test
b. mkdir test/temp
5. Switch user roles as user1 and then back to root using the su command
a. whoami
b. su user1
6. Create a new file as root user and change group ownership as well as user ownership of the file.
a. touch HelloWorld
b. ls -l HelloWorld (observe owner and group)
c. chgrp users HelloWorld
d. chown user2:users HelloWorld
e. ls -l HelloWorld (observe owner and group)

Exercise 2: Differences in File and Folder Permissions

The objective of the following exercises is to see the differences between file and folder (directory) permissions. The chmod command will be used to change file and directory permission to demonstrate the slight differences in permissions for files and directories.

1. Observe the result of ls and cd commands
a. cd /
b. ls -l
c. What are the permissions for HellowWorld

Change directory permissions of user2 directory and try again as user1.
a. su root
b. chmod 740 HelloWorld
c. l. ls -l

Exercise 3: Changing ownership of files and folders.

1. Create a folder called "lab10" on the desktop

2. Run the terminal window and switch to root user
3. Create a user called "test" using useradd and one group called "students" using addgroup
sudo addgroup test
4. sudo adduser test
5. Run chown command to give the ownership of "lab10" to "test" as under
6. use ls -l to verify ownship is change to test or not as shown in following snapshot

As you can see ownership is change for lab10 from root to test user.

7. To change the ownership and group associated with lab10 use chown as under
e.g owner = test and group = students
Verify it using ls -l command as mentioned above.

Create more folders and try to change the ownership of those folders. For help use

man chown

Exercise 4: Default file permissions and Group access control

Whenever a new file is created a default set of permissions can be assigned to it. Whatever the permissions are, the UNIX system allows the user to filter out unwanted permissions set by default. This default setting can be set by the user using the umask command. The command takes the permissions set during creation of file and performs a bitwise AND to the bitwise negation of mask value. Some common umask values are 077 (only user has permissions), 022 (only owner can write), 002 (only owner and group members can write), etc.
1. In a terminal window, make sure you are a root user. If not the root user, then switch back to root user (use your password to switch.
2. Use umask command to check the current mask permission and assign a new mask.
a. umask
b. What is the current mask? How is it interpreted? (try umask -S or the man pages)
c. cd /test
d. touch testmask1
e. ls -al
f. What are the permissions of the file testmask1?
g. umask 0077
h. touch testmask2
i. Now what are the permissions of the file testmask2?

3. What is the effect of setting mask value to 0000?

Attachment:- Access Control and Files System Security.rar

Reference no: EM133015764

Questions Cloud

Compute the number of units : The president of Riverbed Company is under pressure from stockholders to increase net income by $64,300 in 2017. Compute the number of units
What the depreciation expense : A decision was made to change to the straight-line method of depreciation for the machinery. What the depreciation expense for 2022
Calculate the value of the bond : You own a bond that pays $30 in annual interest, with a $1 000 par value. It matures in 20 years. Your required rate of return is 4%. Calculate value of bond
What the chering division residual income : Selected data from Chering Division's accounting records revealed the following: Sales $605,000. What the Chering Division residual income
Changing ownership of files and folders : Demonstrate the slight differences in permissions for files and directories - This manual is for running experiments on Access Control and Files System Security
Find the amount of operating income in the flexible budget : In September, Larson Inc. sold 40,000 units of its only product for $262,000, Find the amount of operating income in the flexible budget
What will the firm true cost of debt be : Costly Corporation plans a new issue of bonds with a par value of $1000, a maturity of 37 years, What will the firm true cost of debt be
What is the expected annual growth rate : A company has stock which costs $42.00 per share and pays a dividend of $2.70 per share this year. What is the expected annual growth rate
Analyse cyber security threats and attacks : Analyse cyber security threats and attacks and Implement and evaluate security testing tools in a realistic computing environment

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd