Professional Documents
Culture Documents
Operating Systems
VU23214 - Configure and secure networked end points
Today’s
Linux operating system environment are
defined
• Linux security applications are identified
topics • Basic system administration using Linux
commands is performed
• Linux commands to enable the personal
computer to communicate with other
devices in a network are defined and
implemented
Windows operating
system
Security
malware, encrypting data, blocking unauthorized
access attempts, and alerting users to potential
security threats. By using security applications,
• Below are a few common maintenance tasks that can be performed using disk utility software:
• Partition management – When working with computer disks, partitions may need to be
created, deleted or resized.
• Mount or Unmount disk partitions – On Unix-like systems, mounting a partition relates to the
process of binding a partition of a disk or a disk image file (usually a .iso) to a folder location.
• Disk Format – Before a partition can be used by the user or the system, it must be formatted.
• Bad Sector Check –When a disk sector is flagged as bad, it becomes harmless to the OS
because it will no longer be used to store data.
• Many bad sectors could be an indicator of a failing disk.
• Query S.M.A.R.T. attributes – S.M.A.R.T. can detect and report attributes about a disk’s
health.
• The goal of S.M.A.R.T. is to anticipate disk failure, allowing the user to move the data to a
healthy disk before the failing disk becomes inaccessible.
Scheduled Tasks
Also known as patches, OS updates are released periodically by OS companies to address any
known vulnerability in their operating systems.
• While companies have update schedules, the release of unscheduled OS updates is common when a major
vulnerability is found in the OS code.
Firmware Updates
• Usually held in non-volatile memory, such as ROM or Flash, firmware is a type of software designed to provide low-
level functionality for a device.
Administrative • sudo – (Super User Do) grants a user root access without actually changing
their profile.
Commands • chown - allows users to switch both the owner and the group of a file or files.
Requiring Root • apt-get – is used to install and manage software on Debian based Linux
distributions.
Access • shutdown – is used to halt and reboot the operating system.
• dd - (Disk Duplicate) is used to copy files and partitions and create temporary
swap files.
User account commands
adduser: This command is used to create a new user account in Linux. It prompts the user to enter
information such as username, password, and home directory for the new user.
useradd: This command is similar to adduser, but it does not create a home directory for the new
user.
passwd: This command is used to set or change the password for a user account. It prompts the user
to enter and confirm a new password.
usermod: This command is used to modify user account properties, such as the home directory, login
shell, or group membership.
groupadd: This command is used to create a new group in Linux.
userdel: This command is used to delete a user account from the system. It can be used with the -r
option to delete the user's home directory as well.
Creating a new user account
1. Open a terminal window in Linux.
2. Use the "adduser" command to create a new user account. For example, to create a user
named "john", enter the following command:
sudo adduser john (remember you will need root access to create new users)
3. You will be prompted to enter a password for the new user. Follow the instructions on the
screen to enter and confirm the password.
4. You will then be prompted to enter some additional information about the user, such as their
full name and phone number. This information is optional, and you can skip it by pressing
"Enter" for each field.
5. Once you have entered all the required information, the new user account will be created.
You can now log out of the root account by entering the command "exit".
6. To log in as the new user, open a new terminal window and enter the following command:
su - john
Basic Unix File
and Directory
Permissions
To organize the system and reinforce
boundaries within the system, Unix
uses file permissions.
Every file and directory on Unix
systems carries its permissions which
define the actions that the owner, the
group, and others can do with the file
or directory.
The only user who can override file
permissions in Unix is the root user.
Root access is often required before
performing maintenance and
administrative tasks.
file permissions
In Linux, file permissions are used to control who can read, write, or execute a file. There are
three types of permissions: read (r), write (w), and execute (x). These permissions are set for
three different categories of users: owner, group, and others.
• Here is a breakdown of what each permission means:
• Read (r): Allows a user to read the contents of a file.
• Write (w): Allows a user to modify the contents of a file.
• Execute (x): Allows a user to run a file if it is a program or script.
There are also three categories of users:
• Owner: The user who created the file.
• Group: The group that the owner belongs to.
• Others: Any user who is not the owner or a member of the owner's group.
The ls –l command output
• Permission - Defines how the user, group, and other access the files and directories.
• Link - The number of links or the number of directories inside this directory
• User - Displays the username of the owner of the file or the directory.
• Group - Displays the name of the group that owns the file or the directory.
• File Size - Displays the file size in bytes.
• Date and Time - Is the data and time of the last modification.
• File Name - Displays the file or directory name.
The "chmod" command can be used to modify file
permissions. For example, to give the owner of the
"example.txt" file execute permission, you can use the
chmod following command:
This will add execute permission (indicated by "x")
for the owner (indicated by "u")
Common networking
commands
Time for a quick break before commencing the activities for this week!