Assignment objectives: The Linux security model is based on the one used on UNIX systems, and is as rigid as the UNIX se
Posted: Tue Jul 05, 2022 10:19 am
Assignment objectives:
The Linux security model is based on the one used on UNIXsystems, and is as rigid as the UNIX security model and sometimeseven more, which is already quite robust. The purpose of thisassignment is to implement and demonstrate your ability to create aprotected and robust filesystem’s administration by managing thepermission and accessing of files and directories using appropriateroutines in Linux operating system.
Recommended Equipment:
Note: The macOS supports LinuxShell-commands on Apple Mac computers/laptops.
Project description:
This assignment organized into Two parts of requirements asfollows:
Part 1: Discuss how the security scheme inLinux allows a high level of security even without networksecurity. Moreover, it can serve files on a need-to-know basis andprotect sensitive data such as home directories and systemconfiguration files.
Part2: Critically analyse the performance ofLinux administration and its file-system management. Provide asummary table of the Linux administration performance by comparingit with the other comparative OS.
The Linux security model is based on the one used on UNIXsystems, and is as rigid as the UNIX security model and sometimeseven more, which is already quite robust. The purpose of thisassignment is to implement and demonstrate your ability to create aprotected and robust filesystem’s administration by managing thepermission and accessing of files and directories using appropriateroutines in Linux operating system.
Recommended Equipment:
Note: The macOS supports LinuxShell-commands on Apple Mac computers/laptops.
Project description:
This assignment organized into Two parts of requirements asfollows:
Part 1: Discuss how the security scheme inLinux allows a high level of security even without networksecurity. Moreover, it can serve files on a need-to-know basis andprotect sensitive data such as home directories and systemconfiguration files.
Part2: Critically analyse the performance ofLinux administration and its file-system management. Provide asummary table of the Linux administration performance by comparingit with the other comparative OS.