Explain why both authentication and access control are needed to implement OS security. (4 marks) List...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Explain why both authentication and access control are needed to implement OS security. (4 marks) List the basic steps that apply to most OS in term of hardening. (5 marks) Create a bash shell script to perform the following tasks: Copy the /etc/passwd file to the root folder and rename it as pass (i.e. /pass). Change the permission of the file /pass such that only the owner can read and execute, whereas all the rest can only read. Change the owner and group of the file/pass to Catherine. Overwrite the content of the file /pass with "I can make it". Append today's date in the format of DDMMYY in the file /pass. Explain why both authentication and access control are needed to implement OS security. (4 marks) List the basic steps that apply to most OS in term of hardening. (5 marks) Create a bash shell script to perform the following tasks: Copy the /etc/passwd file to the root folder and rename it as pass (i.e. /pass). Change the permission of the file /pass such that only the owner can read and execute, whereas all the rest can only read. Change the owner and group of the file/pass to Catherine. Overwrite the content of the file /pass with "I can make it". Append today's date in the format of DDMMYY in the file /pass.
Expert Answer:
Answer rating: 100% (QA)
Authentication and Access Control for OS Security Authentication and access control are crucial components of OS security Authentication Definition Au... View the full answer
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these programming questions
-
On November 1, 2025, Splish Brothers Inc. had the following account balances. The company uses the perpetual inventory method. Debit Credit Cash $21,600 Accumulated Depreciation-Equipment $2,400...
-
Case Study: Quick Fix Dental Practice Technology requirements Application must be built using Visual Studio 2019 or Visual Studio 2017, professional or enterprise. The community edition is not...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Which of the following domains are closed and which are bounded? (a) {(x, y) R: x + y 1} (b) {(x, y) = R: x + y <1} (c) {(x, y) = R: x 0} (d) {(x, y) R: x > 0, y > 0} (e) {(x, y) = R: 1 x 4,5 y 10}...
-
The data from Exercise 16.56 on the concentrations, in milligrams per liter, of each of four chemicals among three different wells. Use a 1% significance level. In Exercises 16.152-16.157, use the...
-
All pixies who slide down moonbeams are fun-loving daredevils. Therefore, it is false that no pixies who slide down moonbeams are fun-loving daredevils. Use the modified Venn diagram technique to...
-
What are some ideal ways for the board and staff to communicate with each other?
-
1. Did Hanousek have the required mental state (mens rea) to be convicted of a crime? Why or why not? 2. Which theory discussed in the chapter would enable a court to hold Hanousek criminally liable...
-
A bank offers your firm a revolving credit arrangement for up to $ 1 1 0 million at an interest rate of 2 . 1 percent per quarter. The bank also requires you to maintain a compensating balance of 7...
-
Wayland Custom Woodworking is a firm that manufactures custom cabinets and woodwork for business and residential customers. Students will have the opportunity to establish payroll records and to...
-
Write a reporton failure of CSR-Volkswagen scandal and use framework like stakeholder theory, caroll's pyramid, triple bottom line and draw a conclusion to show why social resposibility is important...
-
Describe why teams are being formed more frequently in business today. What are some of the special considerations required for a team to be successful?
-
_____ is providing a reward in return for a constructive action on the part of the subject.
-
Describe a situation where empowerment has been used. What are the benefits and drawbacks to empowerment in the situation?
-
Briefly explain the limitations of natural-language interfaces to an application system with respect to: a. Ambiguity of commands b. Establishing the lexicon c. Ambiguity in responses d. Changes to...
-
Developing countries have complained that the terms of trade they face are unfavorable. If they voluntarily engage in international trade, what do you suppose they mean by unfavorable terms of trade?
-
How have you managed conflict in the past? Explain.
-
Selected condensed data taken from a recent statement of financial position of Morino Ltd. are as follows. MORINO LTD. Statement of Financial Position (partial) Other current assets...
-
Recall that once an incident has been confirmed and classified properly, the IR plan moves into the detection phase. Summarize the action steps for reacting to incidents. They include: Notifying key...
-
Discuss how forces of nature, force majeure, or acts of God pose some of the most dangerous threats, because they are unexpected and can occur with little warning. Emphasize that pandemics, such as...
-
Identify the fact that information is authentic when it is given to a user in the same state that it was created, placed, stored, or transferred. Evaluate the example of e-mail spoofing and how...
-
We are extracting acetic acid from water into 3 -heptanol at \(25^{\circ} \mathrm{C}\) in an extraction column with 30 equilibrium stages. Equilibrium is \(y=0.828\) \(\mathrm{x}\), where...
-
A crossflow extraction system is being used to extract furfural from water into methyl-isobutyl ketone (MIBK) at \(25^{\circ} \mathrm{C}\). The \(9000 \mathrm{~kg} / \mathrm{h}\) of aqueous feed...
-
Solve part a of Example 13-2 with a form of the Kremser equation that has an \(x^{*}\) or \(y^{*}=0\), but do not use Eqs. (12-31) or (13-19). Equation (12-31) Equation (13-19) Example 13-2 The last...
Study smarter with the SolutionInn App