Changing ownership of files and folders

Assignment Help Computer Network Security
Reference no: EM133015764

Access Control and Files System Security

Description: This manual is for running experiments on Access Control and Files System Security.

In the first exercise, you will setup the file hierarchy structure and the user accounts on a Kali Linux environment. In the second exercise, students will use chmod command to change file and directory permission to demonstrate the slight differences in permissions for files and directories.

Third exercise is on changing ownership of files and folders and fourth exercise focuses on file permissions and Group access control.

Pre-work:
1. Launch Virtual Box
2. Launch your Kali
3. Do all your exercises in the VM

Exercise 1: Setting up File Structure and User space

The objective of this exercise is to setup the file hierarchy structure and the user accounts that are required for the exercises in this section. The su command is used to switch users.

1. Login as root
2. Use useradd command to create two new users user1 and user2 as follows:
a. useradd user1 -g users
b. useradd user2 -g users
3. Check user information with the id command. Note the uid, gid for each output.
a. id user1
b. id user2
4. Create directory structure
a. mkdir test
b. mkdir test/temp
5. Switch user roles as user1 and then back to root using the su command
a. whoami
b. su user1
6. Create a new file as root user and change group ownership as well as user ownership of the file.
a. touch HelloWorld
b. ls -l HelloWorld (observe owner and group)
c. chgrp users HelloWorld
d. chown user2:users HelloWorld
e. ls -l HelloWorld (observe owner and group)

Exercise 2: Differences in File and Folder Permissions

The objective of the following exercises is to see the differences between file and folder (directory) permissions. The chmod command will be used to change file and directory permission to demonstrate the slight differences in permissions for files and directories.

1. Observe the result of ls and cd commands
a. cd /
b. ls -l
c. What are the permissions for HellowWorld

Change directory permissions of user2 directory and try again as user1.
a. su root
b. chmod 740 HelloWorld
c. l. ls -l

Exercise 3: Changing ownership of files and folders.

1. Create a folder called "lab10" on the desktop

2. Run the terminal window and switch to root user
3. Create a user called "test" using useradd and one group called "students" using addgroup
sudo addgroup test
4. sudo adduser test
5. Run chown command to give the ownership of "lab10" to "test" as under
6. use ls -l to verify ownship is change to test or not as shown in following snapshot

As you can see ownership is change for lab10 from root to test user.

7. To change the ownership and group associated with lab10 use chown as under
e.g owner = test and group = students
Verify it using ls -l command as mentioned above.

Create more folders and try to change the ownership of those folders. For help use

man chown

Exercise 4: Default file permissions and Group access control

Whenever a new file is created a default set of permissions can be assigned to it. Whatever the permissions are, the UNIX system allows the user to filter out unwanted permissions set by default. This default setting can be set by the user using the umask command. The command takes the permissions set during creation of file and performs a bitwise AND to the bitwise negation of mask value. Some common umask values are 077 (only user has permissions), 022 (only owner can write), 002 (only owner and group members can write), etc.
1. In a terminal window, make sure you are a root user. If not the root user, then switch back to root user (use your password to switch.
2. Use umask command to check the current mask permission and assign a new mask.
a. umask
b. What is the current mask? How is it interpreted? (try umask -S or the man pages)
c. cd /test
d. touch testmask1
e. ls -al
f. What are the permissions of the file testmask1?
g. umask 0077
h. touch testmask2
i. Now what are the permissions of the file testmask2?

3. What is the effect of setting mask value to 0000?

Attachment:- Access Control and Files System Security.rar

Reference no: EM133015764

Questions Cloud

Compute the number of units : The president of Riverbed Company is under pressure from stockholders to increase net income by $64,300 in 2017. Compute the number of units
What the depreciation expense : A decision was made to change to the straight-line method of depreciation for the machinery. What the depreciation expense for 2022
Calculate the value of the bond : You own a bond that pays $30 in annual interest, with a $1 000 par value. It matures in 20 years. Your required rate of return is 4%. Calculate value of bond
What the chering division residual income : Selected data from Chering Division's accounting records revealed the following: Sales $605,000. What the Chering Division residual income
Changing ownership of files and folders : Demonstrate the slight differences in permissions for files and directories - This manual is for running experiments on Access Control and Files System Security
Find the amount of operating income in the flexible budget : In September, Larson Inc. sold 40,000 units of its only product for $262,000, Find the amount of operating income in the flexible budget
What will the firm true cost of debt be : Costly Corporation plans a new issue of bonds with a par value of $1000, a maturity of 37 years, What will the firm true cost of debt be
What is the expected annual growth rate : A company has stock which costs $42.00 per share and pays a dividend of $2.70 per share this year. What is the expected annual growth rate
Analyse cyber security threats and attacks : Analyse cyber security threats and attacks and Implement and evaluate security testing tools in a realistic computing environment

Reviews

Write a Review

Computer Network Security Questions & Answers

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  What are the costs of the advertised security training

What are the costs of the advertised security training? Network certification? General computer training?

  Describe the different identification methods

Describe the different identification methods that organizations can use to identify their employees and to grant access to the organizational infrastructure.

  Analyse how trust is used in controlling access

Analyse how trust is used in controlling access to resources. Evaluate the proposed solution used in emergent environments such as BYOD, cloud and pervasive environments.

  What types of risks or vulnerabilities could be transferred

What types of risks or vulnerabilities could be transferred from a supplier and/or imposed upon a purchaser of cyber security related products and/or services?

  What is utc and why is it used

How they are syncronised and why do they need to be syncronised and what is UTC and why is it used?

  Drafting a security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include. Research and discuss 3 items that you believe are the most important when drafting a security policy plan..

  Discuss how the measure could be implemented in a firewall

Discuss how this measure could be implemented in a firewall and what components and architecture would be needed to do this.

  Implement a secure network infrastructure

Implement a secure network infrastructure for a commercial LAN or WAN environment - Understand the impact on the social and commercial environment of network security design

  Analysis to be presented in a 10- to 15-slide microsoft

analysis to be presented in a 10- to 15-slide microsoft powerpoint presentation and use detailed speaker notes for

  Implementation of the security recommendations

Describe how each of the OSs chosen will be updated and patched. Justify your choice based on the security of the OS along with cost considerations

  Explain the whole learning process of the switches

Consider  an institutional LAN Shown in the figure below that is composed of five host (A,B,C,D,E) and two transparent switches (Switch 1 and Switch 2). Assume that frames are exchanged as follows. Explain the whole learning process of the Switches.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd