File Permissions in Linux

Project description This project repairs file permissions to its appropriate status. Check file and directory details After performing the command, ls -la in the /home/researcher2/projects/ directory, we found the following status. Describe the permissions string In the /home/researcher2/projects directory, there are five files with the following names and permissions: project_k.txt: -rw-rw-rw- User = read, write Group = read, write Other = read, write project_m.txt: -rw-r----- User = read, write Group = read Other = none project_r....

July 18, 2023 · 2 min · 321 words · Kazuhiro Funakoshi

Incident Report Analysis

Back to incident report Incident report analysis Instructions As you continue through this course, you may use this template to record your findings after completing an activity or to take notes on what you’ve learned about a specific tool or concept. You can also use this chart as a way to practice applying the NIST framework to different situations you encounter. Summary The organization recently experienced a DDoS attack, which compromised the internal network for two hours until it was resolved....

July 18, 2023 · 2 min · 315 words · Kazuhiro Funakoshi

Stakeholder Memorandum

Back to Security Audit Stakeholder memorandum TO: IT Manager, Stakeholders FROM: Kazuhiro Funakoshi DATE: 07/13/2023 SUBJECT: Internal IT Audit Findings and Recommendations Dear Colleagues, Please review the following information regarding the Botium Toys internal audit scope, goals, critical findings, summary and recommendations. Scope The following systems are in scope: accounting, endpoint detection, firewalls, intrusion detection system, security information and event management (SIEM) tool. Ensure current user permissions, controls, procedures, and protocols in place align with necessary compliance requirements....

July 17, 2023 · 2 min · 312 words · Kazuhiro Funakoshi

Compliance Checklist

Back to Security Audit [ ] The Federal Energy Regulatory Commission - North American Electric Reliability Corporation (FERC-NERC) The FERC-NERC regulation applies to organizations that work with electricity or that are involved with the U.S. and North American power grid. Organizations have an obligation to prepare for, mitigate, and report any potential security incident that can negatively affect the power grid. Organizations are legally required to adhere to the Critical Infrastructure Protection Reliability Standards (CIP) defined by the FERC....

July 17, 2023 · 2 min · 382 words · Kazuhiro Funakoshi

Controls Assessment

Back to Security Audit Controls Assessment Current assets Assets managed by the IT Department include: On-premises equipment for in-office business needs Employee equipment: end-user devices (desktops/laptops, smartphones), remote workstations, headsets, cables, keyboards, mice, docking stations, surveillance cameras, etc. Management of systems, software, and services: accounting, telecommunication, database, security, ecommerce, and inventory management Internet access Internal network Vendor access management Data center hosting services Data retention and storage Badge readers Legacy system maintenance: end-of-life systems that require human monitoring Administrative Controls Least Priviledge Needs to be implemented; High...

July 17, 2023 · 3 min · 517 words · Kazuhiro Funakoshi