Assignment 2
Assignment 2
Objectives
Background / Scenario
Linux employs a robust permission system that controls access to files and directories.
Understanding and managing these permissions is crucial for system security. Each file and
directory has an owner and a group associated with it, determining who can read, write, or
execute the file.
Required Resources
• Kali Linux VM
• Terminal access
Concepts
1. File Permissions
Linux file permissions determine who can read, write, or execute files. Permissions are divided
into three types:
2. User Types
• Owner: The user who created the file.
• Group: Users who belong to the same group as the file's group.
• Others: All other users.
3. Permission Representation
• Example: -rwxr-xr--
o The first character indicates the type (- for file, d for directory).
o The next three characters are for the owner, the following three for the group,
and the last three for others.
r Read permission 4
w Write permission 2
x Execute permission 1
- No permission 0
Commands to Learn
Instructions
mkdir PermissionTest
3. Navigate into the directory:
cd PermissionTest
4. Create a new file:
touch testfile.txt
What to Observe:
• Notice the output showing permissions for testfile.txt.
ls -l
Explanation:
• 777 means that the owner, group, and others all have read (r), write (w), and execute (x)
permissions.
• This is useful for sharing files, but it poses security risks, as anyone can modify or delete
the file.
Step 3: Revert Permissions
1. Revert the permissions to 644 (owner can read/write, group and others can read):
ls -l
o file1.txt: Full permissions for owner, read and execute for group and others
(755).
o file2.txt: Read and write for the owner, read for group and others (644).
2. mkdir Project
sudo chown $USER:$USER Project
Conclusion
In this lab, you learned about file permissions and ownership in Linux. Understanding these
concepts is vital for securing your files and managing access in a multi-user environment.
Mastery of permission commands will enable you to maintain control over your system's
resources.
Lab 5: Individual Research on Linux
Objectives
In this lab, you will:
Background
Linux is a versatile, open-source operating system widely used in various domains, from
personal computers to servers and embedded systems. Understanding its features,
distributions, and applications is essential for anyone pursuing a career in cybersecurity
or IT.
Required Resources
• Access to the internet for research.
• Document editor (e.g., Google Docs, Microsoft Word).
Instructions
Part 1: Research Topics
Use the table below to organize your research findings. Fill in each section based on
your selected topic.
Conclusion
Through this individual research lab, you will deepen your understanding of Linux and
its various components. This knowledge is vital for your development in cybersecurity
and IT fields, enhancing your skills and readiness for real-world applications.
Additional Resources