Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Question 1

The web administrator of your organisation needs to login remotely to the machine that is running the organisation's public web site.
You tell her that the only way to login is via The Secure Shell|which she knows nothing about! Assuming she is logging in via a
Linux box write a help document for her containing the following

a. A short introduction to SSH, explaining why it is the preferred way of logging into a remote machine|this explanation will need to discuss symmetric and asymmetric key encryption.

b. A discussion of the contents of the le ~/.ssh/known_hosts. Your discussion should include (but not be limitted to):

how the le is populated,  how the keys in the le are used by SSH,  a discussion of \man-in-the-middle" attacks,  why the hostnames in the le are \hashed", and how individual keys can be deleted by ssh-keygen.

c.  A description how to con gure access so that no passwords are needed|that is by using user asymmetric keys. This will require

a discussion (with examples) of the command ssh-keygen, the le ~/.ssh/authorized_keys, passphrase protected keys and the commands ssh-agent and ssh-add.

Notes:

a. Any technical term used must be explained.

b. Your virtual Debian has the SSH dmon installed and run-ning by default|so you can SSH to it from the host system or from a second virtual machine.

c. Your virtual machine has two network interfaces con gured|a host only interface and a NAT interface. To bring the host only network \up" study the man pages interfaces(5), ifup(8) and ifdown(8).

d. You must show the relevant changes/parts of any les discussed.

e. This is a help document so you must explain (in your own words) the purpose of every le and command mentioned (plus any command line options).

Be very clear which key (public or private) is stored on which machine (remote or local)

g. Port forwarding, SSH tunnels and rewalls need not be discussed| they will be covered later in the course.

Question 2
a.  In about a page explain in your own words what a Logical Volume Manager is, its purpose and why it is useful.
b.  Illustrate your explanation by using the Linux Log- ical Volume Manager to combine the two spare disks available on the Virtual Debian distribution. Combine the two disks into one logical volume. Format the new logical disk and modify the /etc/fstab le to mount the new disk at boot.
c.  Document and explain in your own words the purpose of every command you use (plus any command line options) and any con guration les or scripts you modify or create.

Notes:

a. Be certain to explain the meaning of any tehnical terms you may use|for example, what is a \physical volume", a \volume group", &c.
b. Make use of the utilities pvdisplay, vgdisplay, &c. to show the results of commands and that they have worked.

Question 3

A user comes to you requesting that you create and implement a backup policy for his desktop machine. What he wants, is to be able to place a blank DVD in his Single-Sided DVD-burner at the end of the working day on a Friday and have all the les he has been working on for the week backed up automatically that evening to the DVD!

After a bit more questioning you nd out that:


He frequently creates/deletes and changes les on a daily basis.
 He wants to be able to recover les for any given day.
 He only wants his home directory backed up.
 His home directory contains about 2Gbytes of data.
 His desktop machine has a spare disk (mounted as /spare) that has plenty of free space for temporary storage.

Tasks that need to be done:

4a.  Using the information above design a backup policy. Give a detailed description and justi cation of your backup-policy.
b. Using tar, a shell script or scripts and a crontab le implement your backup policy.
c.  Document and explain in your own words the purpose of every command you use (plus any command line options) and any con guration les or scripts you modify or create.

 

Attachment:- Assignment.pdf

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9897062
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Suppose alice wants to communicate with bob using symmetric

Suppose Alice wants to communicate with Bob using symmetric key cryptography with a session key KS. They have no public key cryptography and they intend to use a key distribution center (KDC). The KDC is a server that sh ...

Assignment wireless applications advances advantages and

Assignment : Wireless Applications, Advances, Advantages, and Disadvantages The adoption of wireless technologies varies from one industry to another, and is often based on the benefits provided versus the challenges, im ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

Final project incident response exercise amp reportyour

Final Project: Incident Response Exercise & Report Your Task You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident desc ...

Assignment -global finance inc gfi - global finance inc gfi

Assignment - GLOBAL FINANCE, INC. (GFI) - Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GFI specia ...

Question 12326 packet tracer - configuring pap and chap

Question 1 2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication Submit your answer as Q1.pka Question 2 2.5.1.2 Packet Tracer - Skills Integration Challenge Submit your answer as Q2.pka Question 3 3.4.2.4 Pack ...

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

Two countries australia and france have their interest

Two Countries Australia and France have their interest rates to be 8% and 2 %, respectively. If their currencies trade according to 2 Australian $s buy one euro in the spot market, what will their future spot rate be in ...

Research assignmentproduce a formal 2000 word report in the

Research Assignment Produce a formal 2000 word report, in the format described in the supplied "Reports format and style" document, examining the various "Transition from IPv4 to IPv6". You are to research and compare th ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As