Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

APUS Linux IAM With File Handling Labs

APUS Linux IAM With File Handling Labs

Description

1.
Secure User Access Management in Linux

▪Essential
Linux commands

▪File
handling

▪User
access control (groups, ownership)

Introduction

Linux
is a powerful operating system that is pervasively used today, even
though it might not be apparent to you.

Data
from TOP500 shows that Linux powers 100% of the world’s top
500 supercomputers, which is an astonishing statistic.

Linux
is so ubiquitous that it is present in cell phones, cars,
refrigerators, and Roku devices. It runs most of the internet
and several supercomputers. In fact, stock exchanges across the world
in several countries run on Linux.

The
reason Linux is so popular is that it is one of the most reliable,
secure, and robust operating systems available. Here, we list
and explain some important basic Linux commands so you can learn how
to use Linux with ease.

Problem
Statement Document

Identity
and Access Management (IAM) is a centralized and consistent
way to manage user identities (that is, people, services, and
servers), automate access controls, and meet compliance requirements
across traditional and containerized environments.

User
management includes everything from creating a user to deleting a
user on your system.

User
management can be done in three ways on a Linux system. Graphical
tools are easy and

suitable
for new users, as they make sure you’ll not run into
any trouble.

Requirement:

1.Students are
free to use any Linux distro (Kali is preferred)

2.Basic
understanding of user access management in Linux Goal:

1.To
demonstrate the understanding of IAM in Linux

2.To
implement IAM in day – to – day scenarios

Lab
1: The CTO of the company, Mr. Penny Johnson, has recently
discussed a new project with a potential client. He has sent you
the file and asked you to — noida.txt

save
it on your Linux machine. Once saved, you are instructed to
create a user account “pjohnson” and the project directory
and place the file in the folder. Applying the concepts of FACL
(Access Control List), you have to give access to Mr.
Johnson. No one else should be able to access the file except
Mr. Johnson.

Make
sure to remove any other user access to that file. As a part
of the assignment, kindly log in as another user
and try accessing the file.

Kindly
compile and explain the process in a report
(support with visual evidence). Note: You are
expected to demonstrate that Mr. Penny has access and that
any other user cannot access the file.

Lab2: You
are a part of the IT Security team at the census
department, the government of India. Three representatives
were chosen from three states namely Goa,
Delhi, and Gujarat who need to have access to specific
files. Those files are attached herewith. Following is the activity
to be performed.

Create
users “stefi, aravind, and jignesh”. Keep the
password as “india”. Create a new group called “citizen”.

Download
the following and extract it to the desktop: government.zip
Change the permissions for Gujarat so that jignesh has full
permissions and aravind has only read and execute
permissions. Log in as aravind.

Is
he able to edit Gujarat ahmedabad.txt? Edit the
permissions for Delhi recursively in such a way
that stefi has no access. Log in as stefi and check
if he is unable to access the content of Delhi. Grant full
rights to the citizen of Goa. Edit the rights
for goaanjuna.txt so that only stefi can
write and aravind to read, and for goacandolim.txt so
that only jignesh can write and stefi to read.

Considerations: You
have root privileges.

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Writers Hero only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Writers Hero are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Writers Hero is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Writers Hero, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.