In this activity, I examined and updated Linux file permissions in a simulated enterprise environment.
I ensured that sensitive data in the /home/researcher2/projects
directory was properly protected
by using commands like ls -la
, chmod
, and chown
. This strengthened my
understanding of Linux-based access control.
I used the following command to list all permissions:
ls -la /home/researcher2/projects
This revealed the following files and their permissions:
Example: -rw-r--r--
-
: regular filerw-
: owner has read and writer--
: group has read-onlyr--
: others have read-only
I removed write access for "other" on project_k.txt
using:
chmod o-w project_k.txt
This ensures that unauthorized users cannot alter the file.
I secured .project_x.txt
by removing all permissions from others and giving read-only to user and group:
chmod u-w,g-w,g+r .project_x.txt
I changed permissions for the drafts
directory to limit access to group
from drafts directory:
chmod g-x drafts
Through this project, I demonstrated the ability to audit and manage Linux file permissions using commands such as
ls -la
and chmod
. I protected sensitive project files by restricting access and verifying permission configurations.
This exercise improved my readiness for real-world cybersecurity scenarios involving multi-user environments.