![]() ![]() This attack would encrypt the entire server’s hard disk and can only be unlocked using a 256-bit digital key after a Bitcoin payment is delivered. Step 2: Create, Manage, and Automate Cron Jobs In response to a ransomware attack, you have been tasked with creating an archiving and backup scheme to mitigate against CryptoLocker malware. Bonus Create an incremental archive called logs_ that contains only changed ±les by examining the snapshot.file for the /var/log directory. Verify that this new Javaless_Docs.tar archive does not contain the Java subdirectory by using tar to list the contents of Javaless_Docs.tar and then piping grep to search for Java. If you've executed this command properly, you should have a Javaless_Docs.tar archive in the ~/Projects folder. Create a tar archive called Javaless_Docs.tar that excludes the Java directory from the newly extracted TarDocs/Document/ directory. Verify that there is a Java subdirectory in the TarDocs/Documents folder by running ls -l ~/Projects/TarDocs/Documents/. ![]() Note that when you run ls, you should see a new ~/Projects/TarDocs directory with ±ve new subdirectories under TarDocs/. Note that because you want to preserve the directory structure of our archive, you do not have to specify a target directory to extract to. Then, list the directory's contents with ls to verify that you have extracted the archive properly. Extract the TarDocs.tar archive ±le into the current directory ( ~/Projects ). To get started, navigate to the ~/Projects directory, where your downloaded TarDocs.tar archive ±le should be. In this section, you will extract and exclude speci±c ±les and directories to help speed up your work³ow. Step 1: Create, Extract, Compress, and Manage tar Backup Archives Creating tar archives is something you must do every day in your role at Credico Inc. Make sure to read the instructions carefully. In each of the following sections, you will use and build on your system administration tools and knowledge. Download the following ±le (you can either slack it to yourself or use the Firefox browser in your Ubuntu machine), and move it to your ~/Projects directory before you get started: TarDocs.tar (±le/d/1-4m1mcHHZr2GmRg6jeGPPkPbljlvV2aD/view?usp=sharing) Instructions As you solve each of the following steps, ±ll out the Module 5 Challenge Submission File () (remember to make a copy of this document before ±lling it out). Create a directory called Projects in your /home/sysadmin/ directory. Alternatively, press Windows+A (Windows) or Command+A (Mac), type "Terminal" in the search bar, and select the terminal icon (not the Xfce Terminal icon). Open the terminal within your Ubuntu VM by pressing Ctrl+Alt+T (Windows) or Ctrl+Options+T (Mac). Use the following credentials: Username: sysadmin Password: cybersecurity 2. Lab Environment To set up your lab environment with the necessary ±les, complete the following steps: 1. You will expand and enhance this log management system by learning new tools, adding advanced features, and researching additional concepts. These tools, in addition to archives, backups, scripting, and task automation, contribute to a fully comprehensive log management system. Log auditing with auditd to track events, record the events, detect abuse or unauthorized activity, and create custom reports. developed an e²cient log management program that performs: Log size management using logrotate. In an effort to mitigate network attacks and meet federal compliance, Credico Inc. The company must comply with the Federal Trade Commission's Gramm-Leach-Bliley Act ( GLBA () ), which requires that ±nancial institutions explain their information-sharing practices to their customers and protect sensitive data. The data is maintained on a local server. The company collects, processes, and maintains a large database of private ±nancial information for both consumer and business accounts. ![]() Scenario For this assignment, you will play the role of a security analyst at Credico Inc., a ±nancial institution that offers checking, savings, and investment banking services. If you get stuck, remember that you can also use Google and man pages for more information. Feel free to refer to the student guides and slides from this module's lessons as you work through the assignment. Creating an auditing system to check for policy and ±le violations using auditd. Performing log ±ltering using journalctl. Writing bash scripts to create system resource usage reports. Module 5 Challenge Due Wednesday by 11:59pm Points 100 Submitting a text entry box or a website url Start Assignment Archiving and Logging Data This Challenge assignment is designed to solidify and demonstrate your knowledge of the following concepts and tools: Creating a tar archive that excludes a directory using the -exclude= command option. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |