Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Cybersecurity Module 4 Challenge Submission File Linux Systems Administration Make a copy of this document to work in , and then for each step, add

Cybersecurity
Module 4 Challenge Submission File
Linux Systems Administration
Make a copy of this document to work in, and then for each step, add the solution commands below the prompt. Save and submit this completed file as your Challenge deliverable.
Step 1: Ensure/Double Check Permissions on Sensitive Files
Permissions on /etc/shadow should allow only root read and write access.
Command to inspect permissions:
[Enter answer here]
Command to set permissions (if needed):
[Enter answer here]
Permissions on /etc/gshadow should allow only root read and write access.
Command to inspect permissions:
[Enter answer here]
Command to set permissions (if needed):
[Enter answer here]
Permissions on /etc/group should allow root read and write access, and allow everyone else read access only.
Command to inspect permissions:
[Enter answer here]
Command to set permissions (if needed):
[Enter answer here]
Permissions on /etc/passwd should allow root read and write access, and allow everyone else read access only.
Command to inspect permissions:
[Enter answer here]
Command to set permissions (if needed):
[Enter answer here]
Step 2: Create User Accounts
Add user accounts for sam, joe, amy, sara, and admin1 with the useradd command.
Command to add each user account (include all five users):
[Enter answer here]
Ensure that only the admin1 has general sudo access.
Command to add admin1 to the sudo group:
[Enter answer here]
Step 3: Create User Group and Collaborative Folder
Add an engineers group to the system.
Command to add group:
[Enter answer here]
Add users sam, joe, amy, and sara to the managed group.
Command to add users to engineers group (include all four users):
[Enter answer here]
Create a shared folder for this group at /home/engineers.
Command to create the shared folder:
[Enter answer here]
Change ownership on the new engineers shared folder to the engineers group.
Command to change ownership of engineers shared folder to engineers group:
[Enter answer here]
Step 4: Lynis Auditing
Command to install Lynis:
[Enter answer here]
Command to view documentation and instructions:
[Enter answer here]
Command to run an audit:
[Enter answer here]
Provide a report from the Lynis output with recommendations for hardening the system.
Screenshot of report output:
Optional Additional Challenge
Command to install chkrootkit:
[Enter answer here]
Command to view documentation and instructions:
[Enter answer here]
Command to run expert mode:
[Enter answer here]
Provide a report from the chrootkit output with recommendations for hardening the system.
Screenshot of end of sample output:

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions