4.9 Exercise Manage User Account Access and Provide Secure File Storage

docx

School

Butler University *

*We aren’t endorsed by this school

Course

216

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

6

Uploaded by ElderStingrayMaster51

Report
4.9 Exercise Manage User Account Access and Provide Secure File Storage Task 1 – Manage User Account Access Ans(a). To ensure the principle of least privilege is followed, the following account policy can be implemented for the three groups at PayYouMe: 1. Web server administrators : Members of this group should be granted access to only the web servers they are responsible for managing. They should not have access to any other servers or systems. This can be achieved by creating a group policy object (GPO) that restricts their access to only the necessary resources and permissions required to perform their job functions. The GPO should be linked to the appropriate organizational unit (OU) in Active Directory. 2. Linux administrators : Members of this group should be granted access to only the Linux servers they are responsible for managing. They should not have access to any other servers or systems. This can be achieved by creating a GPO that restricts their access to only the necessary resources and permissions required to perform their job functions. The GPO should be linked to the appropriate OU in Active Directory. 3. Security analysts : Members of this group should be granted access to only the log files they need to read. They should not have access to any other files or systems. This can be achieved by creating a GPO that restricts their access to only the necessary resources and permissions required to perform their job functions. The GPO should be linked to the appropriate OU in Active Directory.
Ans(b). Special permissions may be required to create user or group accounts. These permissions can be granted to the appropriate individuals or groups by modifying the GPOs created for each group. For example, members of the Linux administrators’ group may require the ability to create new user accounts or groups. This permission can be granted by modifying the GPO that applies to the Linux servers. Ans(c). To write a formal report on this topic, we can follow these steps: 1. Introduction : Introduce the topic of account policies and access permissions and explain why they are important. 2. Background : Provide some background information on the topic, including the principle of least privilege and its importance in ensuring security. 3. Account policy for web server administrators : Describe the account policy for web server administrators, including the permissions they should be granted and the servers they should have access to. 4. Account policy for Linux administrators : Describe the account policy for Linux administrators, including the permissions they should be granted and the servers they should have access to. 5. Account policy for security analysts : Describe the account policy for security analysts, including the permissions they should be granted and the log files they should have access to. 6. Special permissions : Describe the special permissions that may be required to create user or group accounts, and explain how these permissions can be granted only to authorized personnel. 7. Conclusion : Summarize the main points of the report and emphasize the importance of following account policies and access permissions to ensure security.
You can use the information provided in this response as a starting point for your report. We may also want to conduct additional research to gather more information on this topic. Task 2 – Secure File Storage Server Ans(a). To design a file storage server solution for Linux that allows files to be read but not modified, you can use read-only permissions. This will allow users to access the files, but not modify them. You can also use access control lists (ACLs) to further restrict access to the files. To explain how a Linux server can read data from a secure server in the local network, you can use Secure Shell (SSH). SSH is a secure protocol that allows you to connect to a remote server securely over an unsecured network. You can use SSH to transfer files between servers, as well as to execute commands on remote servers. To use SSH, you will need to install an SSH client on your local machine and an SSH server on the remote server. Once you have installed the necessary software, you can use the scp command to transfer files between servers. The scp command uses SSH to transfer files securely between servers. To read data from a secure server in the local network, you can use Network File System (NFS). NFS is a distributed file system protocol that allows you to share files between servers over a network. To use NFS, you will need to install an NFS server on the remote server and an NFS client on the local machine. Once you have installed the necessary software, you can mount the remote file system on your local machine using the mount command. This will allow you to access the files on the remote server as if they were on your local machine.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Ans(b). Different Linux filesystem mounting options have different implications when it comes to read- write versus read-only access. When mounting a filesystem in a Linux environment, permissions are a very important factor. Specifically, read-only and read-and-write access configurations determine how we interact with the data. When mounting a whole filesystem, we usually have two choices: ro (read-only) and rw (read-write). The ro option allows you to mount the filesystem in read-only mode, which means that you can only read the files on the filesystem, but you cannot modify them. The rw option allows you to mount the filesystem in read-write mode, which means that you can both read and modify the files on the filesystem. The implications of selecting read-write versus read-only options are significant. If you mount a filesystem in read-write mode, you can modify the files on the filesystem, which means that you can accidentally delete or overwrite important data. On the other hand, if you mount a filesystem in read- only mode, you cannot modify the files on the filesystem, which means that you cannot accidentally delete or overwrite important data. Ans( c). Here are some informal topics you can write about regarding the confidentiality of customer data on a local area network (LAN): 1. Why is it important to keep customer data confidential? Discuss the potential consequences of data breaches and how they can impact both the company and the customers. 2. How can companies ensure that customer data remains confidential? Discuss the various measures that companies can take to protect customer data, such as using encryption, access control, and monitoring.
3. What are some common mistakes that companies make when it comes to data confidentiality? Discuss some of the common pitfalls that companies fall into when trying to protect customer data, such as failing to update software or not properly training employees. To explain how a Linux server can read data from a secure server in the local network, you can use Secure Shell (SSH). SSH is a secure protocol that allows you to connect to a remote server securely over an unsecured network. You can use SSH to transfer files between servers, as well as to execute commands on remote servers. To use SSH, you will need to install an SSH client on your local machine and an SSH server on the remote server. Once you have installed the necessary software, you can use the scp command to transfer files between servers. The scp command uses SSH to transfer files securely between servers. To explain the implications of selecting read-write versus read-only options when mounting a Linux filesystem, you can discuss the potential risks and benefits of each option. For example, mounting a filesystem in read-write mode allows you to modify the files on the filesystem, but also increases the risk of accidental deletion or overwriting of important data. On the other hand, mounting a filesystem in read-only mode prevents accidental modification of files, but may limit the functionality of the system. It’s important to weigh the pros and cons of each option before making a decision. References: 1. Gite, V(2023). 40 Linux Server Hardening Security Tips. www.cyberciti.biz 2. Clinton, D(2019). How to Secure your Linux web server. FreeCodeCamp. www.freecodecamp.org 3. Gerganov, H(2023). Mount permission and remounting a Filesystem as Writable. Baeldung. www.baeldung.com 4. Policies and Permission in IAM. AWS. User Guide. Amazon. https://docs.aws.amazon.com
5. Willey, P(2020). How to manage user Permission in Access Database? Access Repair. www.accessrepairnrecovery.com
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help