Task 1. Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities can be given...

4 answer below »
Task

1. Originally Linux/UNIX systems had one all-powerful user called
root
that managed systems. Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems. Include a sample generic policy for a limited user from which a configuration could be written. (500 words)


2. Attempt to install the following web applications on Linux. The Moodle Learning Platform link: http://moodle.org, The Etherpad shared document editing system link: http://etherpad.org, and The Community version of the Alfresco Enterprise Content Management System link: http://alfresco.com. You should write a short report documenting each of the installations even if you don't get the applications running. (3 to 5 pages per report)


Rationale

This assessment item is designed to test your ability formulate methods for protecting data and services, to create and manage information services, and produce coherent and knowledgeable writings in these topic areas.




Document Preview:

Task 1. Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems. Include a sample generic policy for a limited user from which a configuration could be written. (500 words) 2. Attempt to install the following web applications on Linux. The Moodle Learning Platform link: http://moodle.org, The Etherpad shared document editing system link: http://etherpad.org, and The Community version of the Alfresco Enterprise Content Management System link: http://alfresco.com. You should write a short report documenting each of the installations even if you don't get the applications running. (3 to 5 pages per report) Rationale This assessment item is designed to test your ability formulate methods for protecting data and services, to create and manage information services, and produce coherent and knowledgeable writings in these topic areas.



Answered Same DayDec 24, 2021

Answer To: Task 1. Originally Linux/UNIX systems had one all-powerful user called root that managed systems....

Robert answered on Dec 24 2021
121 Votes
Linux/UNIX

Linux/UNIX
Installing software androot access
Student name
[Pick the date]
Contents
Consequences of using single root user ............................................................................................................ 2
Sample security settings for root access ...................................................
.................................................... 2
Installing Moodle ............................................................................................................................................... 4
Step 1: Install requirements........................................................................................................................... 4
Step 2: Download moodle ............................................................................................................................. 4
Step 3: Creating database .............................................................................................................................. 4
Step 4 : Install moodle ................................................................................................................................... 4
Installation of Etherpad ..................................................................................................................................... 5
Step 1: Install requirements .......................................................................................................................... 5
Step 2: Install node.js .................................................................................................................................... 5
Step 3: Download and install etherpad ......................................................................................................... 6
Installation of Alfresco Enterprise Content Management System .................................................................... 7
Step 1: Download Alfresco source code ........................................................................................................ 7
Step 2: Property settings ............................................................................................................................... 7
Step 3: Create alfresco database ................................................................................................................... 7
Consequences of using single root user
The operating systems like Linux/Unix support multiple users who can work on the same machine
simultaneously. The multiple users can connect to the system via different terminals or
network connections.
The root user of the Linux/Unix system is the most privileged user. The file system in UNIX and
Linux systems is divided into multiple parts like /etc /usr etc. The /usr file system is the partition
with programs and unchanging dadta. /var file system is the partition with changing data like log
files, a /home directory is there to store the data of all the users. These partitions and their
configurations can be different depending on the configuration of the system hardware and how
the system administrator wants these partitions to be. These partitions can also be kept all in
single root system which was the case way earlier when there were less security constraints on the
file systems of the UNIX/Linux systems.
The root partition of the machine is file system which is specific for it and is stored locally. The...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here