【ACW66】Secure Digital Infrastructure

al Machine Configuration

A leading Japanese Biotech company has recently acquired some virtual machine resources to begin deployment of their research data management system and to additionally facilitate in-house research and development. You have been given a freshly created Virtual Machine which will need configuring appropriately. Your role as administrator for this company is to configure these systems and maintain them.

Task:

  1. Secure, with justification, the root user account
  2. Setup administrative users for yourself and another one for the module leader (Ahmd Moustafa)
  3. Setup and correctly configure the SSH server, taking into account all user account
  4. Create accounts where needed for the following persons:
    1. Katsuhide Fujita - Head of R&D
    2. Naoko Yamaguchi - Lead Scientist
    3. Kai Yoshino- Is an intern (Kun) with the company and is being closely supervised by Naoko. He will require access to materials which Naoko will place in a folder in /srv/ for him to access as part of his
    4. Shota Suzuki – Media Manager, requiring access to /srv/http to see, and put any promotional material. Shota is not familiar withCLI, and only requires SFTP access infrequently.
    5. Daiki Setoguchi & Makoto Hagiwara - Company research engineers who need access to dedicated project materials for on-going These also reside in /srv/.
    6. Yuya Kondo - Quality Manager responsible for verifying that developed work conforms to company standards and works

Store, and secure access to, a research project data directory (under /srv/) for research engineers to have access to. Research engineers should have full access to the research projects’ folders; however, the quality managers should not be able to change the 

  1. research data, only check the experimentation data for compliance and whether they follow the quality guidelines. Senior members of the company such as the Lead Scientist and the Head of R&D should be able to oversee any company research project/asset. On occasion, they will contribute to research projects developed by Daiki and Makoto.
  2. Conduct a comprehensive security assessment and audit of the configured system. Identify potential security risks, vulnerabilities, and areas of improvement. Propose and justify strategies for managing and mitigating these risks. Include steps for responding to security incidents and maintaining an updated security posture.  

Critical reflection section: reflecting on the process of learning these tools, and of configuring the VM to this specification. This can include challenges faced (such as error messages) and how you solved them, as well as personal reflections on the process as a whole. 

As Kai has just started, Naoko does not yet have any materials tosend him; however, she still requires a place to put these when ready.

Kai has been told he should normally use private keys; however, he asks if he can login with password only from the following host on the local network: (150.237.92.8 ); Everywhere else he has private keys to login.

 

First Steps

Follow the vSphere access instructions, including VPN access.

Each VM has internet connection for downloading any packages you may need. Each of your VMs is also in a subnetwork, therefore enabling communication between your colleagues for testing purposes. Note: Any abuse of this will be dealt with severely.

 

You should request a reset of your Virtual Machine when you are ready to attempt this assignment task, as it will require documenting your progression. See the “What if things go wrong / needs resetting” section below for details on resetting back to the template.

 

What if things go wrong / needs resetting?

It is possible for you to misconfigure your machine which will result in your being locked out. In some cases, even using the vSphere login web console might not be possible. If you have fully locked yourself out, and a snapshot isn’t available to roll-back to, then you may request your VM be reset back to the template by opening a Virtual Machine ticket on support.hull.ac.uk putting “For the attention of Andrew Hancock” at the top.

Please ensure you include your 6-digit ADIR number so your response can be dealt with promptly.

 

This WILL wipe your VM back to the original workshop starting point, and will require you to reinstall many packages which you may be familiar with from workshops.

 

Also note, it may take time for these to be reset depending on the current workload of ICTD, therefore consider this a warning against last minute VM configurations close to the deadline.

 

Deliverable

A PDF report ( Minimum 4 pages; Maximum 8 pages ) detailing the steps from the initial machine given to you, towards the goal of configuring to the above specification. You should provide clear and justified rationale for decisions made.

You should include steps taken to verify that changes implemented are working as intended. You may utilise additional software which is required to be installed via pacman; however, these must be justified and fit-for-purpose.

 

Cover page, table of contents page, appendices, and references sections do not count towards the page limit.

 

Note: Your VM will NOT be inspected for being awarded marks. Therefore you should ensure that your documented progress sufficiently shows the steps taken. It is expected that when performing configuration steps that these are done optimally and with consideration of security of the system such as proper root and non-root administrative account use

  • 23
    点赞
  • 24
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
本火锅店点餐系统采用Java语言和Vue技术,框架采用SSM,搭配Mysql数据库,运行在Idea里,采用小程序模式。本火锅店点餐系统提供管理员、用户两种角色的服务。总的功能包括菜品的查询、菜品的购买、餐桌预定和订单管理。本系统可以帮助管理员更新菜品信息和管理订单信息,帮助用户实现在线的点餐方式,并可以实现餐桌预定。本系统采用成熟技术开发可以完成点餐管理的相关工作。 本系统的功能围绕用户、管理员两种权限设计。根据不同权限的不同需求设计出更符合用户要求的功能。本系统中管理员主要负责审核管理用户,发布分享新的菜品,审核用户的订餐信息和餐桌预定信息等,用户可以对需要的菜品进行购买、预定餐桌等。用户可以管理个人资料、查询菜品、在线点餐和预定餐桌、管理订单等,用户的个人资料是由管理员添加用户资料时产生,用户的订单内容由用户在购买菜品时产生,用户预定信息由用户在预定餐桌操作时产生。 本系统的功能设计为管理员、用户两部分。管理员为菜品管理、菜品分类管理、用户管理、订单管理等,用户的功能为查询菜品,在线点餐、预定餐桌、管理个人信息等。 管理员负责用户信息的删除和管理,用户的姓名和手机号都可以由管理员在此功能里看到。管理员可以对菜品的信息进行管理、审核。本功能可以实现菜品的定时更新和审核管理。本功能包括查询餐桌,也可以发布新的餐桌信息。管理员可以查询已预定的餐桌,并进行审核。管理员可以管理公告和系统的轮播图,可以安排活动。管理员可以对个人的资料进行修改和管理,管理员还可以在本功能里修改密码。管理员可以查询用户的订单,并完成菜品的安排。 当用户登录进系统后可以修改自己的资料,可以使自己信息的保持正确性。还可以修改密码。用户可以浏览所有的菜品,可以查看详细的菜品内容,也可以进行菜品的点餐。在本功能里用户可以进行点餐。用户可以浏览没有预定出去的餐桌,选择合适的餐桌可以进行预定。用户可以管理购物车里的菜品。用户可以管理自己的订单,在订单管理界面里也可以进行查询操作。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值