Scenario

You are a security professional at a large organization. You mainly work with their research team. Part of your job is to ensure users on this team are authorized with the appropriate permissions. This helps keep the system secure.

Your task is to examine existing permissions on the file system. You’ll need to determine if the permissions match the authorization that should be given. If they do not match, you’ll need to modify the permissions to authorize the appropriate users and remove any unauthorized access.

Current file permissions

This section displays the file structure of the /home/researcher2/projects directory and the permissions of the files and subdirectory it contains.

In the /home/researcher2/projects directory, there are five files with the following names and permissions:

  • project_k.txt

    • User = read, write
    • Group = read, write
    • Other = read, write
  • project_m.txt

    • User = read, write
    • Group = read
    • Other = none
  • project_r.txt

    • User= read, write
    • Group = read, write
    • Other = read
  • project_t.txt

    • User = read, write
    • Group = read, write
    • Other = read
  • .project_x.txt

    • User = read, write
    • Group = write
    • Other = none

There is also one subdirectory inside the projects directory named drafts. The permissions on drafts are:

  • ./drafts
    • User = read, write, execute
    • Group = execute
    • Other = none