Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Explain why both authentication and access control are needed to implement OS security. (4 marks) List the basic steps that apply to most OS

Explain why both authentication and access control are needed to implement OS security. (4 marks) List the

Explain why both authentication and access control are needed to implement OS security. (4 marks) List the basic steps that apply to most OS in term of hardening. (5 marks) Create a bash shell script to perform the following tasks: Copy the /etc/passwd file to the root folder and rename it as pass (i.e. /pass). Change the permission of the file /pass such that only the owner can read and execute, whereas all the rest can only read. Change the owner and group of the file/pass to Catherine. Overwrite the content of the file /pass with "I can make it". Append today's date in the format of DDMMYY in the file /pass.

Step by Step Solution

3.55 Rating (159 Votes )

There are 3 Steps involved in it

Step: 1

Authentication and Access Control for OS Security Authentication and access control are crucial components of OS security Authentication Definition Au... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles Of Information Security

Authors: Michael E. Whitman, Herbert J. Mattord

7th Edition

035750643X, 978-0357506431

More Books

Students also viewed these Programming questions

Question

describe several successful positive work interventions.

Answered: 1 week ago