The Internet

Log In or Register

The project aims to enhance information security and operational efficiency using Linux by executing various scripts for user account creation, encryption, decryption, file compression, system updates, backups, and more. Despite facing some challenges such as outdated systems and missing packages, the team learned valuable lessons in utilizing Linux for creating efficient shell scripts and carrying out repetitive tasks effectively.

Title: "Exploring Information Security in Digital Environments: A Linux-Based Project Overview"

Bookmark

0 Points

▲ good image

bad image ▼

Ask AI on The Internet

Question: Introduction Information security is the practice of protecting sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing measures and controls to ensure the confidentiality, integrity, and availability of information. Information security aims to prevent data breaches, cyber-attacks, and other security incidents that could compromise the confidentiality, integrity, or availability of information. It encompasses various technologies, processes, and practices to safeguard information and ensure the security of digital assets. This document provides an overview of the project and its objectives. It includes information about the project scope, stakeholders, and key deliverables. Background MTN Eswatini has consistently led the delivery of a bold, new Digital World to its customers through its voice and data solutions to enable its customers to live a whole lot better since its inception in 1998. It is part of the MTN group established in 1994 and is made up of 22 operations in Africa, Middle East and Europe. MTN Eswatini is a Swati company and its shareholding structure stands as follows: SPTC-41% MTN Group-30% Esteemed Shareholder-10% Eswatini Empowerment Limited-19% MTN Eswatini is now pursuing new growth opportunities in the data and ICT space. To date, MTN Eswatini has over 950 000 subscribers and the number continues to grow. Project Requirement In order to work with Linux, you will need a pc running Linux as an operating system either on virtual machine or dual boot to execute all the commands as follows. Creating a script that with take input for the user and create two users in the Desktop directory. Granting the (+x) executing permission to the userscript.sh Implementing the AES encryption Implementing the AES encryption on a file called (text.txt) with the encryption script called encrypt.sh Running the encryption script, granting the text file executing permission and displaying results Implementing the DES decryption on a file called (text.txt.gpg) with the decryption script called decrypt.sh Running the decryption script (./decrypt.sh) and displaying results Script for compressing file into a zipped format Script for extracting a zipped file Bash script for performing updates Result after running the automatic update script which was updating VLC application Bash script for daily system backup Results after running the backup scripts and save the file in a directory called secure_dir Creating an undeletable bash script User account creation bash script Running the bash script for user account creation Displaying the location of user account Mkelo with it project file that is located within the user’s directory. Preparing Linux for web hosting (Install or start apache2) Problem faced The problem was that our Kali Linux operating system was an older version, which caused us to encounter difficulties in running Apache2 and supporting the HTML page. Additionally, we found that the packages for zipping and unzipping were also uninstalled. We attempted to update the system by using the command “apt update” and then tried to start the Apache2 service with the command “service apache2 start”. However, we received an error message stating “Failed to start apache2.service: Unit apache2.service not found.” Lesson learned Through this experience, we have learnt that it is much simpler to work around with Linux because it allows us to create shell scripts that can be executed repeatedly over time. For example, we discovered that creating a script for adding a user can be a more efficient method. This highlights the flexibility and power of Linux as an operating system. summarize Introduction Information security is the practice of protecting sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing measures and controls to ensure the confidentiality, integrity, and availability of information. Information security aims to prevent data breaches, cyber-attacks, and other security incidents that could compromise the confidentiality, integrity, or availability of information. It encompasses various technologies, processes, and practices to safeguard information and ensure the security of digital assets. This document provides an overview of the project and its objectives. It includes information about the project scope, stakeholders, and key deliverables. Background MTN Eswatini has consistently led the delivery of a bold, new Digital World to its customers through its voice and data solutions to enable its customers to live a whole lot better since its inception in 1998. It is part of the MTN group established in 1994 and is made up of 22 operations in Africa, Middle East and Europe. MTN Eswatini is a Swati company and its shareholding structure stands as follows: SPTC-41% MTN Group-30% Esteemed Shareholder-10% Eswatini Empowerment Limited-19% MTN Eswatini is now pursuing new growth opportunities in the data and ICT space. To date, MTN Eswatini has over 950 000 subscribers and the number continues to grow. Project Requirement In order to work with Linux, you will need a pc running Linux as an operating system either on virtual machine or dual boot to execute all the commands as follows. Creating a script that with take input for the user and create two users in the Desktop directory. Granting the (+x) executing permission to the userscript.sh Implementing the AES encryption Implementing the AES encryption on a file called (text.txt) with the encryption script called encrypt.sh Running the encryption script, granting the text file executing permission and displaying results Implementing the DES decryption on a file called (text.txt.gpg) with the decryption script called decrypt.sh Running the decryption script (./decrypt.sh) and displaying results Script for compressing file into a zipped format Script for extracting a zipped file Bash script for performing updates Result after running the automatic update script which was updating VLC application Bash script for daily system backup Results after running the backup scripts and save the file in a directory called secure_dir Creating an undeletable bash script User account creation bash script Running the bash script for user account creation Displaying the location of user account Mkelo with it project file that is located within the user’s directory. Preparing Linux for web hosting (Install or start apache2) Problem faced The problem was that our Kali Linux operating system was an older version, which caused us to encounter difficulties in running Apache2 and supporting the HTML page. Additionally, we found that the packages for zipping and unzipping were also uninstalled. We attempted to update the system by using the command “apt update” and then tried to start the Apache2 service with the command “service apache2 start”. However, we received an error message stating “Failed to start apache2.service: Unit apache2.service not found.” Lesson learned Through this experience, we have learnt that it is much simpler to work around with Linux because it allows us to create shell scripts that can be executed repeatedly over time. For example, we discovered that creating a script for adding a user can be a more efficient method. This highlights the flexibility and power of Linux as an operating system. Please summarize

Asked by snoe

0 Points

Log In or Register to Vote

The document details a project by MTN Eswatini which sought to enhance its Information Security through various workflows on Linux systems. Key processes included creating scripts to add two users, AES encryption and decryption on a text file, compressing and extracting a zipped file, automatic system updates, and backups. Challenges faced included an outdated Kali Linux system which obstructed the running of Apache2 and supporting HTML page, and the absence of packages for zipping and unzipping. The experience underscored the value of Linux's capacity to create repeatable shell scripts, enhancing efficiency in tasks such as adding users.

Answered by gpt-4

March 18, 2024, 12:36 a.m.

0 Points

Log In or Register to Vote

A new large language model has been made available since this question was asked.

To generate an updated answer from the new model, click the button below.

Think your answer is better than the AI's? Post it below.

Please log in or sign up to post your answer.

This article was generated in part by one of OpenAI’s large-scale language-generation model, answering user snoe's question. Images were generated with OpenAI's AI model, DALL·E 2. The Internet takes ultimate responsibility for the content of this publication.
If you want your question answered by an AI, click here.

Published: Monday, March 18, 2024

Comment Section

Post your own comment: