Description
THe assignment is due on 11/11 but the plan must be pre-approved so if you can think of the plan ahead of time and let me know I can get it approved so you can complete the assignment.
template (referenced in assignment sheet)
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Nice! Really impressed with the quality.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
3 pages
Difference Between Outer And Inner Join
There are some key differences between outer and inner joins when it comes to merging several dataframes. For example, an ...
Difference Between Outer And Inner Join
There are some key differences between outer and inner joins when it comes to merging several dataframes. For example, an inner join will return a ...
Functional Programming
Write a 2-part program as follows:Part 1: Write a function to convert Celsius to FahrenheitPart 2: Write a function to con ...
Functional Programming
Write a 2-part program as follows:Part 1: Write a function to convert Celsius to FahrenheitPart 2: Write a function to convert Farenheit to CelsiusBoth of the functions (Celsius to Farenheit and Farenheit to Celsius) are the exact inverses of one another.Test the program by converting 32 degrees Farenheit to Celsius and then the product of that function back to Farenheit.Capture screenshots of your output for each conversion. Paste the screenshot into a Word document.In addition, write a 1/2-page response to the following:When you converted 32 degrees Farenheit to Celsius and back to Farenheit, did you get 32 again? Try different numbers and state when it does work and when it doesn't work. Explain why.Submit your Word document and your .py file in a .zip file
ENTD321 State Models Dq
1. What is the state diagram? What are its components? When and how it would be used? 2. Discuss the states of the cl ...
ENTD321 State Models Dq
1. What is the state diagram? What are its components? When and how it would be used? 2. Discuss the states of the class Appointment.A web search for relevant articles and information could be employed to assist you in your response. Please No Plagiarism Please use APA formatting and in text cititation Minimum word count 400
DVU R Programming Shiny Project & Working with ggplot Programming Exercise
7.3 SHINY PROJECT 1CREATING CODERecreate the R code found in Chapter 4 "Creating Your First shiny Project" from your readi ...
DVU R Programming Shiny Project & Working with ggplot Programming Exercise
7.3 SHINY PROJECT 1CREATING CODERecreate the R code found in Chapter 4 "Creating Your First shiny Project" from your readings in this module. The complete code appears following Figure 4-5. Stop before the "Working with ggplot" section.Execute your code and then take a screenshot of your output. Move your slider and take a second screenshot of that output. Paste both screenshots into a document and submit your results for this assignment. You do not need to include your code in this submission.Shiny Project #2Creating codeModify the base R version (not the ggplot version) of the "Another shiny Project" found in Chapter 4 of this module's readings. Replace the "airquality" data set with the R built-in data set "mtcars".Use only the variables mpg, disp, hp, drat, wt, and qsec from the mtcars data set. Pick any two variables which make sense to use for the regression equation.Copy your R code and program output in a document and submit your results for this assignment.
Stratford University Red Black Betting Game System Programming Question
The Red Black Game If you did not attend the week 3 zoom session, please include a short summary in your task report th ...
Stratford University Red Black Betting Game System Programming Question
The Red Black Game If you did not attend the week 3 zoom session, please include a short summary in your task report this week. Watch the introduction video on the first project: video link: The Red Black Game If you did not attend the week 3 zoom session, please include a short summary in your task report this week. Watch the introduction video on the first project:PlayMuteLoaded: 0%Progress: 0%-3:14Fullscreen
YOU ARE ONLY SUBMITTING THE IIPO for task 4 and answering the questions at the bottom of the assignment. Do not start Lesson 4 the flowchart until you get feedback from me. This means you will need to complete Task 4 before Saturday 29 August at noon. The MGM CASINO in the National Harbor needs a new game built. The owners noticed that you are a Java programmer and are interested in your work. With the COVID-19 problem, they determined an automated game might bring in much-needed revenue.Phase I Design (Task 4) Complete the IIPOPhase II Design step 2 (Lesson 4) FlowchartPhase III Coding/Testing (Task 5) Complete the Java CodeProblem: MGM would like to capture the user’s name to make the interface more enjoyable. They will use this to show the player's name on the screen during the game. This is a simple betting game of chance. The user starts with $500 in their bank. Each round they can bet any amount up to the amount they have in their bank. They can bet on Red or Black. If they match the color, they will win the amount of their bet. Otherwise, they lose the amount of their bet.After each round, your program should display winning color, if the player won or lost money, the new amount in their bank, and the round number. They can continue to play until they have no more money, or they have played 5 rounds. 1. Complete the full IIPO. For the processing section, indicate the fundamental concepts of programming that will be used and include the equations used in the game (there are several). The code is not necessary at this point. 2. What should the user’s bank amount be at the start of the game? 3. What are the two ways the game will end?4. Given the instructions on the game, is there a possibility that the players could cheat? How can we make sure that this situation is avoided?5. Can the user's bank ever go below 0?PlayMuteLoaded: 0%Progress: 0%-3:14Fullscreen
YOU ARE ONLY SUBMITTING THE IIPO for task 4 and answering the questions at the bottom of the assignment. Do not start Lesson 4 the flowchart until you get feedback from me. This means you will need to complete Task 4 before Saturday 29 August at noon. The MGM CASINO in the National Harbor needs a new game built. The owners noticed that you are a Java programmer and are interested in your work. With the COVID-19 problem, they determined an automated game might bring in much-needed revenue.Phase I Design (Task 4) Complete the IIPOPhase II Design step 2 (Lesson 4) FlowchartPhase III Coding/Testing (Task 5) Complete the Java CodeProblem: MGM would like to capture the user’s name to make the interface more enjoyable. They will use this to show the player's name on the screen during the game. This is a simple betting game of chance. The user starts with $500 in their bank. Each round they can bet any amount up to the amount they have in their bank. They can bet on Red or Black. If they match the color, they will win the amount of their bet. Otherwise, they lose the amount of their bet.After each round, your program should display winning color, if the player won or lost money, the new amount in their bank, and the round number. They can continue to play until they have no more money, or they have played 5 rounds. 1. Complete the full IIPO. For the processing section, indicate the fundamental concepts of programming that will be used and include the equations used in the game (there are several). The code is not necessary at this point. 2. What should the user’s bank amount be at the start of the game? 3. What are the two ways the game will end?4. Given the instructions on the game, is there a possibility that the players could cheat? How can we make sure that this situation is avoided?5. Can the user's bank ever go below 0?
Lewis University Credico Inc Log Management Program Project
ScenarioFor this assignment, you will play the role of a security analyst for Credico Inc., a financial institution that o ...
Lewis University Credico Inc Log Management Program Project
ScenarioFor this assignment, you will play the role of a security analyst for Credico Inc., a financial institution that offers checking, savings, and investment banking services.The company collects, processes, and maintains a large database of private financial information for both consumer and business accounts.The data is maintained on a local server.The company must comply with the Federal Trade Commission's Gramm-Leach-Bliley Act (GLBA), which requires that financial institutions explain their information-sharing practices to their customers and protect sensitive data.In an effort to mitigate network attacks and meet federal compliance, Credico Inc. developed an efficient log management program that performs:Log size management using logrotate.Log auditing with auditd to track events, record the events, detect abuse or unauthorized activity, and create custom reports.These tools, in addition to archives, backups, scripting, and task automation, contribute to a fully comprehensive log management system.You will expand and enhance this log management system by learning new tools, adding advanced features, and researching additional concepts.Lab EnvironmentTo set up your lab environment with the necessary files, complete the following steps.Log into your local virtual machine. Use the following credentials:Username: sysadminPassword: cybersecurityOpen the terminal within your Ubuntu VM by pressing Ctrl+Alt+T for Windows users or Ctrl+Options+T for Mac users.Alternatively, press Windows+A (Command+A for Mac users), type "Terminal" in the search bar, and select the terminal icon (not the Xfce Terminal icon).Create a directory called Projects in your /home/sysadmin/ directory.Download the following file (you can either slack it to yourself or use the Firefox browser in your Ubuntu machine), and move it to your ~/Projects directory before you get started:TarDocs.tarInstructionsAs you solve each step below, please fill out the Submission File. This will be your homework deliverable.In each of the following sections, you will use and build on your system administration tools and knowledge. Make sure to read the instructions carefully.Step 1: Create, Extract, Compress, and Manage tar Backup ArchivesCreating tar archives is something you must do everyday in your role at Credico Inc. In this section, you will extract and exclude specific files and directories to help speed up your workflow.To get started, navigate to the ~/Projects directory where your downloaded TarDocs.tar archive file should be.Extract the TarDocs.tar archive file into the current directory (~/Projects). Afterwards, list the directory's contents with ls to verify that you have extracted the archive properly.Note that because we want to preserve the directory structure of our archive, we do not have to specify a target directory to extract to.Note that when you run ls you should see a new ~/Projects/TarDocs directory with five new subdirectories under TarDocs/.Verify that there is a Java subdirectory in the TarDocs/Documents folder by running: ls -l ~/Projects/TarDocs/Documents/.Create a tar archive called Javaless_Docs.tar that excludes the Java directory from the newly extracted TarDocs/Document/ directory.If you've executed this command properly, you should have a Javaless_Docs.tar archive in the ~/Projectsfolder.Verify that this new Javaless_Docs.tar archive does not contain the Java subdirectory by using tar to list the contents of Javaless_Docs.tar and then piping grep to search for Java.BonusCreate an incremental archive called logs_backup.tar.gz that contains only changed files by examining the snapshot.file for the /var/log directory. You will need sudo for this command.Step 2: Create, Manage, and Automate Cron JobsIn response to a ransomware attack, you have been tasked with creating an archiving and backup scheme to mitigate against CryptoLocker malware. This attack would encrypt the entire server’s hard disk and can only be unlocked using a 256-bit digital key after a Bitcoin payment is delivered.For this task, you'll need to create an archiving cron job using the following specifications:This cron job should create an archive of the following file: /var/log/auth.log.The filename and location of the archive should be: /auth_backup.tgz.The archiving process should be scheduled to run every Wednesday at 6 a.m.Use the correct archiving zip option to compress the archive using gzip.To get started creating cron jobs, run the command crontab -e. Make sure that your cron job line includes the following:The schedule (minute, hour, etc.) in cron format. - Hint: Reference the helpful site crontab.guru as needed.An archive (tar) command with three options.The path to save the archive toThe path of the file to archive.Step 3: Write Basic Bash ScriptsPortions of the Gramm-Leach-Bliley Act require organizations to maintain a regular backup regimen for the safe and secure storage of financial data.You'll first need to set up multiple backup directories. Each directory will be dedicated to housing text files that you will create with different kinds of system information.For example, the directory freemem will be used to store free memory system information files.Using brace expansion, create the following four directories:~/backups/freemem~/backups/diskuse~/backups/openlist~/backups/freediskNote: Remember that brace expansion uses the following format: ~/exampledirectory/{subdirectory1,subdirectory2,etc}Now you will create a script that will execute various Linux tools to parse information about the system. Each of these tools should output results to a text file inside its respective system information directory.For example: cpu_usage_tool > ~/backups/cpuuse/cpu_usage.txtIn the above example, the cpu_usage_tool command will output CPU usage information into a cpu_usage.txt file.To get started with setting up your script up in your home directory, do the following:Navigate to your home directory by running: cd ~/Run the command nano system.sh to open a new Nano window.Note: If you're unsure how to get started, we included a system.sh starter file. Use that as a guide.Edit the system.sh script file so that it that does the following:Prints the amount of free memory on the system and saves it to ~/backups/freemem/free_mem.txt.Prints disk usage and saves it to ~/backups/diskuse/disk_usage.txt.Lists all open files and saves it to ~/backups/openlist/open_list.txt.Prints file system disk space statistics and saves it to ~/backups/freedisk/free_disk.txt.Note: For the free memory, disk usage, and free disk commands, make sure you use the -h option to make the output human-readable.Save this file and make sure to change or modify the system.sh file permissions so that it is executable.You should now have an executable system.sh file within your home ~/ directory.Test the script with sudo ./system.sh.Note: If it appears, ignore the warning: lsof: WARNING: can't stat() fuse.gvfsd-fuse file system /run/user/1001/gvfs Output information may be incomplete.OptionalConfirm the script ran properly by navigating to any of subdirectories in the ~/backup/ directory and using cat <filename> to view the contents of the backup files.BonusAutomate your script system.sh by adding it to the weekly system-wide cron directory.Step 4. Manage Log File SizesYou realize that the spam messages are making the size of the log files unmanageable.You’ve decided to implement log rotation in order to preserve log entries and keep log file sizes more manageable. You’ve also chosen to compress logs during rotation to preserve disk space and lower costs.Run sudo nano /etc/logrotate.conf to edit the logrotate config file. You don't need to work out of any specific directory as you are using the full configuration file path.Configure a log rotation scheme that backs up authentication messages to the /var/log/auth.log directory using the following settings:Rotates weekly.Rotates only the seven most recent logs.Does not rotate empty logs.Delays compression.Skips error messages for missing logs and continues to next log.Don't forget to surround your rotation rules with curly braces {}.Bonus: Check for Policy and File ViolationsIn an effort to help mitigate against future attacks, you have decided to create an event monitoring system that specifically generates reports whenever new accounts are created or modified, and when any modifications are made to authorization logs.Verify the auditd service is active using the systemctl command.Run sudo nano /etc/audit/auditd.conf to edit the auditd config file using the following parameters. You can run this command from anywhere using the terminal.Number of retained logs is seven.Maximum log file size is 35.Next, run sudo nano /etc/audit/rules.d/audit.rules to edit the rules for auditd. Create rules that watch the following paths:For /etc/shadow, set wra for the permissions to monitor and set the keyname for this rule to hashpass_audit.For /etc/passwd, set wra for the permissions to monitor and set the keyname for this rule to userpass_audit.For /var/log/auth.log, set wra for the permissions to monitor and set the keyname for this rule to authlog_audit.Restart the auditd daemon.Perform a listing that reveals all existing auditd rules.Note: If you're unsure how to construct these rules, refer to the auditd section within the 5.3 Student Guide.Using sudo, produce an audit report that returns results for all user authentications.Note: You will need to log out and back in to populate the report.Now you will shift into hacker mode. Create a user with sudo useradd attacker and produce an audit report that lists account modifications.Use auditctl to add another rule that watches the /var/log/cron directory.Perform a listing that reveals changes to the auditd rules took affect.Bonus (Reasearch Activity): Perform Various Log Filtering TechniquesThere was a suspicious login from a host on the network during the early morning hours when the office was closed. The senior security manager tasked you with filtering through log files to determine if a system breach occurred.For the bonus, write the journactl commands, for each use case below.Hint: Remember that journal tracks each log relative to each system boot. Also, keep in mind that you can sort messages by priority, relative boot, and specific units.Write the journalctl command that performs a log search that returns all messages, with priorities from emergency to error, since the current system boot.Write the journalctl command that checks the disk usage of the system journal unit since the most recent boot. You will likely have to pipe this output to less if it doesn't fit on the screen.The unit you want is systemd-journald.Write the journalctl command that removes all archived journal files except the most recent two.Write the journalctl command that filters all log messages with priority levels between zero and two, and save the results to a file named Priority_High.txt in /home/student/ directory.Automate the last task by creating a cron job that runs daily in the user crontab.Note: You'll need sudo to run journalctl.
Similar Content
Business Intelligence and Data Warehouses, Intro To Rela Database programming homework help
Assignment 3: Business Intelligence and Data WarehousesDue Week 9 and worth 100 pointsBusinesses today are extremely relia...
UF Java Programs Project
...
Web Design.
Create An Entertaining webpage about celebrity people. REQUIREMENT: CSS file connect to all HTML files.Flash embed in HTML...
Object Oriented Programming IT232
3 MarksLearning Outcome(s):Develop a program based on specification using programming language elements including syntax, ...
CIS 2348 UH Python Project
You will design a program that manages student records at a university. You will need to use a numberof concepts that you ...
IT402 Discussion board
Integrated Enterprise Systems (IT402)
Discussion Board
Purpose
In this discussion board, you will post your answer to the ...
It404 Assignment 2 Q
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the a...
C Code
The following is the C++ program source code that is meant to optimize the profit int maximiseproft( int totalUnits ,int o...
Package Huffman
list_From_file.add(new data(total.substring(0,1),total.substring(2,total.length()))); if(data_from_file==null)data_from_fi...
Related Tags
Book Guides
Nervous Conditions
by Tsitsi Dangarembga
Uncle Tom's Cabin
by Harriet Beecher Stowe
Fools Crow
by James Welch
1984
by George Orwell
Silas Marner
by George Eliot
You Are a Badass
by Jen Sincero
Harry Potter and the Sorcerers Stone
by J. K. Rowling
Ezperanza Rising
by Pam Muñoz Ryan
Steppenwolf
by Hermann Hesse
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
3 pages
Difference Between Outer And Inner Join
There are some key differences between outer and inner joins when it comes to merging several dataframes. For example, an ...
Difference Between Outer And Inner Join
There are some key differences between outer and inner joins when it comes to merging several dataframes. For example, an inner join will return a ...
Functional Programming
Write a 2-part program as follows:Part 1: Write a function to convert Celsius to FahrenheitPart 2: Write a function to con ...
Functional Programming
Write a 2-part program as follows:Part 1: Write a function to convert Celsius to FahrenheitPart 2: Write a function to convert Farenheit to CelsiusBoth of the functions (Celsius to Farenheit and Farenheit to Celsius) are the exact inverses of one another.Test the program by converting 32 degrees Farenheit to Celsius and then the product of that function back to Farenheit.Capture screenshots of your output for each conversion. Paste the screenshot into a Word document.In addition, write a 1/2-page response to the following:When you converted 32 degrees Farenheit to Celsius and back to Farenheit, did you get 32 again? Try different numbers and state when it does work and when it doesn't work. Explain why.Submit your Word document and your .py file in a .zip file
ENTD321 State Models Dq
1. What is the state diagram? What are its components? When and how it would be used? 2. Discuss the states of the cl ...
ENTD321 State Models Dq
1. What is the state diagram? What are its components? When and how it would be used? 2. Discuss the states of the class Appointment.A web search for relevant articles and information could be employed to assist you in your response. Please No Plagiarism Please use APA formatting and in text cititation Minimum word count 400
DVU R Programming Shiny Project & Working with ggplot Programming Exercise
7.3 SHINY PROJECT 1CREATING CODERecreate the R code found in Chapter 4 "Creating Your First shiny Project" from your readi ...
DVU R Programming Shiny Project & Working with ggplot Programming Exercise
7.3 SHINY PROJECT 1CREATING CODERecreate the R code found in Chapter 4 "Creating Your First shiny Project" from your readings in this module. The complete code appears following Figure 4-5. Stop before the "Working with ggplot" section.Execute your code and then take a screenshot of your output. Move your slider and take a second screenshot of that output. Paste both screenshots into a document and submit your results for this assignment. You do not need to include your code in this submission.Shiny Project #2Creating codeModify the base R version (not the ggplot version) of the "Another shiny Project" found in Chapter 4 of this module's readings. Replace the "airquality" data set with the R built-in data set "mtcars".Use only the variables mpg, disp, hp, drat, wt, and qsec from the mtcars data set. Pick any two variables which make sense to use for the regression equation.Copy your R code and program output in a document and submit your results for this assignment.
Stratford University Red Black Betting Game System Programming Question
The Red Black Game If you did not attend the week 3 zoom session, please include a short summary in your task report th ...
Stratford University Red Black Betting Game System Programming Question
The Red Black Game If you did not attend the week 3 zoom session, please include a short summary in your task report this week. Watch the introduction video on the first project: video link: The Red Black Game If you did not attend the week 3 zoom session, please include a short summary in your task report this week. Watch the introduction video on the first project:PlayMuteLoaded: 0%Progress: 0%-3:14Fullscreen
YOU ARE ONLY SUBMITTING THE IIPO for task 4 and answering the questions at the bottom of the assignment. Do not start Lesson 4 the flowchart until you get feedback from me. This means you will need to complete Task 4 before Saturday 29 August at noon. The MGM CASINO in the National Harbor needs a new game built. The owners noticed that you are a Java programmer and are interested in your work. With the COVID-19 problem, they determined an automated game might bring in much-needed revenue.Phase I Design (Task 4) Complete the IIPOPhase II Design step 2 (Lesson 4) FlowchartPhase III Coding/Testing (Task 5) Complete the Java CodeProblem: MGM would like to capture the user’s name to make the interface more enjoyable. They will use this to show the player's name on the screen during the game. This is a simple betting game of chance. The user starts with $500 in their bank. Each round they can bet any amount up to the amount they have in their bank. They can bet on Red or Black. If they match the color, they will win the amount of their bet. Otherwise, they lose the amount of their bet.After each round, your program should display winning color, if the player won or lost money, the new amount in their bank, and the round number. They can continue to play until they have no more money, or they have played 5 rounds. 1. Complete the full IIPO. For the processing section, indicate the fundamental concepts of programming that will be used and include the equations used in the game (there are several). The code is not necessary at this point. 2. What should the user’s bank amount be at the start of the game? 3. What are the two ways the game will end?4. Given the instructions on the game, is there a possibility that the players could cheat? How can we make sure that this situation is avoided?5. Can the user's bank ever go below 0?PlayMuteLoaded: 0%Progress: 0%-3:14Fullscreen
YOU ARE ONLY SUBMITTING THE IIPO for task 4 and answering the questions at the bottom of the assignment. Do not start Lesson 4 the flowchart until you get feedback from me. This means you will need to complete Task 4 before Saturday 29 August at noon. The MGM CASINO in the National Harbor needs a new game built. The owners noticed that you are a Java programmer and are interested in your work. With the COVID-19 problem, they determined an automated game might bring in much-needed revenue.Phase I Design (Task 4) Complete the IIPOPhase II Design step 2 (Lesson 4) FlowchartPhase III Coding/Testing (Task 5) Complete the Java CodeProblem: MGM would like to capture the user’s name to make the interface more enjoyable. They will use this to show the player's name on the screen during the game. This is a simple betting game of chance. The user starts with $500 in their bank. Each round they can bet any amount up to the amount they have in their bank. They can bet on Red or Black. If they match the color, they will win the amount of their bet. Otherwise, they lose the amount of their bet.After each round, your program should display winning color, if the player won or lost money, the new amount in their bank, and the round number. They can continue to play until they have no more money, or they have played 5 rounds. 1. Complete the full IIPO. For the processing section, indicate the fundamental concepts of programming that will be used and include the equations used in the game (there are several). The code is not necessary at this point. 2. What should the user’s bank amount be at the start of the game? 3. What are the two ways the game will end?4. Given the instructions on the game, is there a possibility that the players could cheat? How can we make sure that this situation is avoided?5. Can the user's bank ever go below 0?
Lewis University Credico Inc Log Management Program Project
ScenarioFor this assignment, you will play the role of a security analyst for Credico Inc., a financial institution that o ...
Lewis University Credico Inc Log Management Program Project
ScenarioFor this assignment, you will play the role of a security analyst for Credico Inc., a financial institution that offers checking, savings, and investment banking services.The company collects, processes, and maintains a large database of private financial information for both consumer and business accounts.The data is maintained on a local server.The company must comply with the Federal Trade Commission's Gramm-Leach-Bliley Act (GLBA), which requires that financial institutions explain their information-sharing practices to their customers and protect sensitive data.In an effort to mitigate network attacks and meet federal compliance, Credico Inc. developed an efficient log management program that performs:Log size management using logrotate.Log auditing with auditd to track events, record the events, detect abuse or unauthorized activity, and create custom reports.These tools, in addition to archives, backups, scripting, and task automation, contribute to a fully comprehensive log management system.You will expand and enhance this log management system by learning new tools, adding advanced features, and researching additional concepts.Lab EnvironmentTo set up your lab environment with the necessary files, complete the following steps.Log into your local virtual machine. Use the following credentials:Username: sysadminPassword: cybersecurityOpen the terminal within your Ubuntu VM by pressing Ctrl+Alt+T for Windows users or Ctrl+Options+T for Mac users.Alternatively, press Windows+A (Command+A for Mac users), type "Terminal" in the search bar, and select the terminal icon (not the Xfce Terminal icon).Create a directory called Projects in your /home/sysadmin/ directory.Download the following file (you can either slack it to yourself or use the Firefox browser in your Ubuntu machine), and move it to your ~/Projects directory before you get started:TarDocs.tarInstructionsAs you solve each step below, please fill out the Submission File. This will be your homework deliverable.In each of the following sections, you will use and build on your system administration tools and knowledge. Make sure to read the instructions carefully.Step 1: Create, Extract, Compress, and Manage tar Backup ArchivesCreating tar archives is something you must do everyday in your role at Credico Inc. In this section, you will extract and exclude specific files and directories to help speed up your workflow.To get started, navigate to the ~/Projects directory where your downloaded TarDocs.tar archive file should be.Extract the TarDocs.tar archive file into the current directory (~/Projects). Afterwards, list the directory's contents with ls to verify that you have extracted the archive properly.Note that because we want to preserve the directory structure of our archive, we do not have to specify a target directory to extract to.Note that when you run ls you should see a new ~/Projects/TarDocs directory with five new subdirectories under TarDocs/.Verify that there is a Java subdirectory in the TarDocs/Documents folder by running: ls -l ~/Projects/TarDocs/Documents/.Create a tar archive called Javaless_Docs.tar that excludes the Java directory from the newly extracted TarDocs/Document/ directory.If you've executed this command properly, you should have a Javaless_Docs.tar archive in the ~/Projectsfolder.Verify that this new Javaless_Docs.tar archive does not contain the Java subdirectory by using tar to list the contents of Javaless_Docs.tar and then piping grep to search for Java.BonusCreate an incremental archive called logs_backup.tar.gz that contains only changed files by examining the snapshot.file for the /var/log directory. You will need sudo for this command.Step 2: Create, Manage, and Automate Cron JobsIn response to a ransomware attack, you have been tasked with creating an archiving and backup scheme to mitigate against CryptoLocker malware. This attack would encrypt the entire server’s hard disk and can only be unlocked using a 256-bit digital key after a Bitcoin payment is delivered.For this task, you'll need to create an archiving cron job using the following specifications:This cron job should create an archive of the following file: /var/log/auth.log.The filename and location of the archive should be: /auth_backup.tgz.The archiving process should be scheduled to run every Wednesday at 6 a.m.Use the correct archiving zip option to compress the archive using gzip.To get started creating cron jobs, run the command crontab -e. Make sure that your cron job line includes the following:The schedule (minute, hour, etc.) in cron format. - Hint: Reference the helpful site crontab.guru as needed.An archive (tar) command with three options.The path to save the archive toThe path of the file to archive.Step 3: Write Basic Bash ScriptsPortions of the Gramm-Leach-Bliley Act require organizations to maintain a regular backup regimen for the safe and secure storage of financial data.You'll first need to set up multiple backup directories. Each directory will be dedicated to housing text files that you will create with different kinds of system information.For example, the directory freemem will be used to store free memory system information files.Using brace expansion, create the following four directories:~/backups/freemem~/backups/diskuse~/backups/openlist~/backups/freediskNote: Remember that brace expansion uses the following format: ~/exampledirectory/{subdirectory1,subdirectory2,etc}Now you will create a script that will execute various Linux tools to parse information about the system. Each of these tools should output results to a text file inside its respective system information directory.For example: cpu_usage_tool > ~/backups/cpuuse/cpu_usage.txtIn the above example, the cpu_usage_tool command will output CPU usage information into a cpu_usage.txt file.To get started with setting up your script up in your home directory, do the following:Navigate to your home directory by running: cd ~/Run the command nano system.sh to open a new Nano window.Note: If you're unsure how to get started, we included a system.sh starter file. Use that as a guide.Edit the system.sh script file so that it that does the following:Prints the amount of free memory on the system and saves it to ~/backups/freemem/free_mem.txt.Prints disk usage and saves it to ~/backups/diskuse/disk_usage.txt.Lists all open files and saves it to ~/backups/openlist/open_list.txt.Prints file system disk space statistics and saves it to ~/backups/freedisk/free_disk.txt.Note: For the free memory, disk usage, and free disk commands, make sure you use the -h option to make the output human-readable.Save this file and make sure to change or modify the system.sh file permissions so that it is executable.You should now have an executable system.sh file within your home ~/ directory.Test the script with sudo ./system.sh.Note: If it appears, ignore the warning: lsof: WARNING: can't stat() fuse.gvfsd-fuse file system /run/user/1001/gvfs Output information may be incomplete.OptionalConfirm the script ran properly by navigating to any of subdirectories in the ~/backup/ directory and using cat <filename> to view the contents of the backup files.BonusAutomate your script system.sh by adding it to the weekly system-wide cron directory.Step 4. Manage Log File SizesYou realize that the spam messages are making the size of the log files unmanageable.You’ve decided to implement log rotation in order to preserve log entries and keep log file sizes more manageable. You’ve also chosen to compress logs during rotation to preserve disk space and lower costs.Run sudo nano /etc/logrotate.conf to edit the logrotate config file. You don't need to work out of any specific directory as you are using the full configuration file path.Configure a log rotation scheme that backs up authentication messages to the /var/log/auth.log directory using the following settings:Rotates weekly.Rotates only the seven most recent logs.Does not rotate empty logs.Delays compression.Skips error messages for missing logs and continues to next log.Don't forget to surround your rotation rules with curly braces {}.Bonus: Check for Policy and File ViolationsIn an effort to help mitigate against future attacks, you have decided to create an event monitoring system that specifically generates reports whenever new accounts are created or modified, and when any modifications are made to authorization logs.Verify the auditd service is active using the systemctl command.Run sudo nano /etc/audit/auditd.conf to edit the auditd config file using the following parameters. You can run this command from anywhere using the terminal.Number of retained logs is seven.Maximum log file size is 35.Next, run sudo nano /etc/audit/rules.d/audit.rules to edit the rules for auditd. Create rules that watch the following paths:For /etc/shadow, set wra for the permissions to monitor and set the keyname for this rule to hashpass_audit.For /etc/passwd, set wra for the permissions to monitor and set the keyname for this rule to userpass_audit.For /var/log/auth.log, set wra for the permissions to monitor and set the keyname for this rule to authlog_audit.Restart the auditd daemon.Perform a listing that reveals all existing auditd rules.Note: If you're unsure how to construct these rules, refer to the auditd section within the 5.3 Student Guide.Using sudo, produce an audit report that returns results for all user authentications.Note: You will need to log out and back in to populate the report.Now you will shift into hacker mode. Create a user with sudo useradd attacker and produce an audit report that lists account modifications.Use auditctl to add another rule that watches the /var/log/cron directory.Perform a listing that reveals changes to the auditd rules took affect.Bonus (Reasearch Activity): Perform Various Log Filtering TechniquesThere was a suspicious login from a host on the network during the early morning hours when the office was closed. The senior security manager tasked you with filtering through log files to determine if a system breach occurred.For the bonus, write the journactl commands, for each use case below.Hint: Remember that journal tracks each log relative to each system boot. Also, keep in mind that you can sort messages by priority, relative boot, and specific units.Write the journalctl command that performs a log search that returns all messages, with priorities from emergency to error, since the current system boot.Write the journalctl command that checks the disk usage of the system journal unit since the most recent boot. You will likely have to pipe this output to less if it doesn't fit on the screen.The unit you want is systemd-journald.Write the journalctl command that removes all archived journal files except the most recent two.Write the journalctl command that filters all log messages with priority levels between zero and two, and save the results to a file named Priority_High.txt in /home/student/ directory.Automate the last task by creating a cron job that runs daily in the user crontab.Note: You'll need sudo to run journalctl.
Earn money selling
your Study Documents