Question: Cybersecurity Module 4 Challenge Submission File Linux Systems Administration Make a copy of this document to work in , and then for each step, add

Cybersecurity
Module 4 Challenge Submission File
Linux Systems Administration
Make a copy of this document to work in, and then for each step, add the solution commands below the prompt. Save and submit this completed file as your Challenge deliverable.
Step 1: Ensure/Double Check Permissions on Sensitive Files
Permissions on /etc/shadow should allow only root read and write access.
Command to inspect permissions:
[Enter answer here]
Command to set permissions (if needed):
[Enter answer here]
Permissions on /etc/gshadow should allow only root read and write access.
Command to inspect permissions:
[Enter answer here]
Command to set permissions (if needed):
[Enter answer here]
Permissions on /etc/group should allow root read and write access, and allow everyone else read access only.
Command to inspect permissions:
[Enter answer here]
Command to set permissions (if needed):
[Enter answer here]
Permissions on /etc/passwd should allow root read and write access, and allow everyone else read access only.
Command to inspect permissions:
[Enter answer here]
Command to set permissions (if needed):
[Enter answer here]
Step 2: Create User Accounts
Add user accounts for sam, joe, amy, sara, and admin1 with the useradd command.
Command to add each user account (include all five users):
[Enter answer here]
Ensure that only the admin1 has general sudo access.
Command to add admin1 to the sudo group:
[Enter answer here]
Step 3: Create User Group and Collaborative Folder
Add an engineers group to the system.
Command to add group:
[Enter answer here]
Add users sam, joe, amy, and sara to the managed group.
Command to add users to engineers group (include all four users):
[Enter answer here]
Create a shared folder for this group at /home/engineers.
Command to create the shared folder:
[Enter answer here]
Change ownership on the new engineers shared folder to the engineers group.
Command to change ownership of engineers shared folder to engineers group:
[Enter answer here]
Step 4: Lynis Auditing
Command to install Lynis:
[Enter answer here]
Command to view documentation and instructions:
[Enter answer here]
Command to run an audit:
[Enter answer here]
Provide a report from the Lynis output with recommendations for hardening the system.
Screenshot of report output:
Optional Additional Challenge
Command to install chkrootkit:
[Enter answer here]
Command to view documentation and instructions:
[Enter answer here]
Command to run expert mode:
[Enter answer here]
Provide a report from the chrootkit output with recommendations for hardening the system.
Screenshot of end of sample output:

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!