System and Communication Security Paper
Southern New Hampshire University
CYB 300 System and Comm Security
Final Project Submission: System and Communication Security Paper
Oct 19, 2024
Part ...
System and Communication Security Paper
Southern New Hampshire University
CYB 300 System and Comm Security
Final Project Submission: System and Communication Security Paper
Oct 19, 2024
Part I
executable script in the Linux
#!/bin/bash
sudo hostnamectl set-hostname K_Reddy
sudo timedatectl set-timezone America/Denver
ps -e > RunningProcesses.txt
gsettings set org.gnome.desktop.session idle-delay 180
tail -n 50 /var/log/messages > SecurityLog_Reddy.txt
sudo bash -c 'tail -n 50 /var/log/messages > /var/log/ messages/SecurityLog_LastName.txt'
Rename computer to First Initial_Last Name (use your first initial and your last name)
Command to rename computer: sudo hostnamectl set-hostname K_Johnson
Validation command: hostnamectl
Change time zone to the time zone associated with Denver, Colorado
Command to change time zone: sudo timedatectl set-timezone America/Denver
Validation command: timedatectl
Get a list of running processes
Command to change time zone: ps -e > RunningProcesses.txt
Set idle lock time for screensaver to 3 minutes
Command to change time zone: gsettings set org.gnome.desktop.session idle-delay 180
Validation command: gsettings get org.gnome.desktop.session idle-delay
Send the output of the last 50 entries in the /var/log/messages log to a text file named “SecurityLog_LastName.txt”
Command to change time zone: sudo bash -c 'tail -n 50 /var/log/messages > /var/log/ messages/SecurityLog_LastName.txt'
Validation command: ls -l / var/log/messages
One of the main reasons that practitioners use automated scripts is to save time by avoiding manual configurations. Describe additional benefits of using automated scripts for configuring systems in a secure manner for organizations.
Automated scripts offer significant benefits beyond time savings by ensuring consistency, scalability, and enhanced security in system configurations. By automating processes, organizations achieve standardized configurations across all machines, reducing the risk of human error and security vulnerabilities caused by misconfigurations. This consistency is particularly valuable in large-scale environments, allowing systems to be set up identically and securely in a fraction of the time it would take manually (Leiritie, 2023). Additionally, automation supports scalability by enabling the rapid configuration of large numbers of systems, especially in dynamic environments like cloud infrastructures or DevOps pipelines.
From a security perspective, automation helps maintain a strong and proactive security posture. By embedding security policies, encryption standards, and access controls into scripts, organizations can ensure that security configurations are consistently enforced, reducing the likelihood of oversights. Automated scripts also enable rapid response to vulnerabilities, such as applying patches system-wide in response to newly discovered threats (Leiritie, 2023). Moreover, these scripts can be
Document Details
Word Count: | 1783 |
Page Count: | 11 |
Level: | AS and A Level |
Subject: | Other |