In this lab, I used Linux commands to configure authorization by setting proper file and directory permissions. I explored how permissions control access to files and why that’s essential in preventing unauthorized users from reading or modifying sensitive data.
I also gained insight into how ownership and group memberships affect who can access and edit specific files and directories in a multi-user Linux system.
My task was to audit and configure the file permissions within the /home/researcher2/projects
directory for the researcher2
user,
who belongs to the research_team
group.
projects
directory, including hidden files.chmod
and chown
to correct them./home/researcher2/projects/drafts
directory and modified its permissions to ensure no unauthorized access was possible.This hands-on experience reinforced my understanding of managing authorization securely in Linux environments.
I now feel confident in using the following Linux commands:
ls -l
and ls -la
chmod
chown
These skills are essential for protecting sensitive information and upholding system integrity in any cybersecurity role.