Preview

Nt1330 Unit 3 Lab Report

Powerful Essays
Open Document
Open Document
1102 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Lab Report
1. Create Amazon S3 bucket: amazon ec2

The created S3 bucket stores the encrypted password file. Encryption of the file system happens using such a password or key. When a boot happens for an Amazon EC2 instance, the files are copied, the encrypted password is read, the password is decrypted, and the plaintext password is retrieved. Utilization of this password happens when encrypting the file system on the instance store disk. Through the first step, the creation of an S# bucket occurs to enable the storage of the encrypted password file on it. Application of necessary permissions happens afterward. Additional permissions to the bucket to enable endpoint access are necessary whenever using Amazon VPC endpoint for Amazon S3.

Sign into the
…show more content…
losetup /dev/loop0 secretfs

#Copy encrypted password file from S3. The password is used to configure LUKE later on.

aws s3 cp s3://an-internalstoragekeybucket/LuksInternalStorageKey .

# Decrypt the password from the file with KMS, save the secret password in LuksClearTextKey

LuksClearTextKey=$(aws --region us-east-1 kms decrypt --ciphertext-blob fileb://LuksInternalStorageKey --output text --query Plaintext | base64 --decode)

# Encrypt storage in the device. cryptsetup will use the Linux

# device mapper to create, in this case, /dev/mapper/secretfs.

# Initialize the volume and set an initial key.

echo "$LuksClearTextKey" | cryptsetup -y luksFormat /dev/loop0

# Open the partition, and create a mapping to /dev/mapper/secretfs.

echo "$LuksClearTextKey" | cryptsetup luksOpen /dev/loop0 secretfs

# Clear the LuksClearTextKey variable because we don't need it anymore.

unset LuksClearTextKey

# Check its status (optional).

cryptsetup status secretfs

# Zero out the new encrypted device.

dd if=/dev/zero of=/dev/mapper/secretfs

# Create a file system and verify its status.

mke2fs -j -O dir_index /dev/mapper/secretfs

# List file system configuration

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Adjust cell suspension volume with media so that between 15 to 100 L of cells are used for each well/dish. This small plating volume ensures that there is even cell distribution and that growth factors, drugs, or substrates in the medium are not diluted.…

    • 237 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Lab Report

    • 2556 Words
    • 11 Pages

    Lab #11 Software Defined Radio (SDR) I. Experimental Procedure Equipment List Universal Software Radio Peripheral (USRP) with Flex900 Radio Spectrum analyzer (Agilent E4411 or equivalent) PC with Matlab/Simulink R2011B CAT 6 Ethernet cable SMA(male)-to-BNC Adapter (for spectrum analyzer) 915 MHz Antenna (qty 2) A. INSTRUMENT CONNECTIONS: Connect the antenna to the SMA connector labeled RF1 port on the front of the USRP. Connect another antenna to the spectrum analyzer. Power the USRP with a 6v/3A power adapter. B. CONFIGURE PC: a. Connect the CAT6 cable between the PC and the GB Ethernet port of the USRP. b. Manually set the PC’s Ethernet port IP address under the same subnet mask as the…

    • 2556 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Lab 8

    • 551 Words
    • 3 Pages

    The team also noticed some inconsistencies in the graph that they feel could be fixed by changing their code. One of these issues being that cutting off power completely from the AEV’s resulted in the motors having to do extra work in order to get started again. Possibly changing the code so the amount of power supplied to the motors gradually decreased over time instead of stopping the power completely, could make for a more efficient AEV. Theoretically speaking, when a plane begins to near its destination the pilot begins to lower the amount of thrust given to the engines, not cease thrust completely, so if the team were able to find a way to mimic this, they feel that their AEV could save energy overall, and become more productive.…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I was unable to use Password as the password because it doesn’t meet the password policy requirements.…

    • 96 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NETW410 Week 3 Lab Report

    • 532 Words
    • 2 Pages

    4. Does this network require an access layer? What devices would operate at the access layer? Draw a diagram of these devices at the access layer. Label all of the devices. (10 points)…

    • 532 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Lab Report

    • 567 Words
    • 3 Pages

    Now that you have finished testing DNS and DHCP you will now configure the Windows Server 2008 machine as a replica Domain Controller. In this exercise you will install the Active Directory Domain Services Role on Server##A.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    1. Public Keys and Public Certificates can be stored in the Central Repository. It is not the same as the Public Key Infrastructure, but it is not the same.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab work—If either party has had previous sexual relationships, each should be tested for HIV and other sexually transmitted diseases. Undiagnosed sexually transmitted diseases can lead to infertility in both men and women. Testing for hepatitis is also advisable.…

    • 81 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NETW202 Week1 Lab Report

    • 663 Words
    • 3 Pages

    In your own words, summarize what you have learned concerning network commands available within the Windows operating system.…

    • 663 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    hi my name is

    • 1320 Words
    • 4 Pages

    gThere are three main types of cryptographic algorithms: (1) secret key, (2) public key, and (3) hash functions. Pick an algorithm for any one of these types (e.g., DES, AES, RSA, MD5) and describe how it works and where it is applied (For example SSL uses 3DES or DES) for message encryption. Use your own words. When you pick an algorithm, try not to repeat. Be sure to reference your sources. This is one source I like very much; it is easy to read, fairly up-to-date and has a good discussion on the various applications of Crypto:Your education is our priority! As your partner in education, UMUC is taking important steps towards continually enhancing your online learning experience as we move from the current online course delivery system, WebTycho, to a new online classroom, LEO (Learning Experience Online). This will provide the platform for all of UMUC's online classrooms in the future. To ensure a smooth and successful transition, the migration from WebTycho to LEO is being implemented in a phased approach, and is scheduled for completion in fall 2014.…

    • 1320 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    In Amazon S3, there are various options for you to configure your bucket. For example, your bucket can be configured to manage the lifecycle of objects in the bucket, website hosting and configure it to log all access to the bucket. Amazon S3 supports sub-resources for storing and managing the bucket configuration information. That is, using the Amazon S3 API, you can create and manage these sub-resources. We can also use the console or the AWS SDKs.…

    • 951 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    faltu

    • 943 Words
    • 4 Pages

    import java.io. UnsupportedEncodingException; import java.security. MessageDigest; import java.security. NoSuchAlgorithmException; import java.util.…

    • 943 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    puthiyathorulagam seivom

    • 1054 Words
    • 5 Pages

    search the title for new innovative ideas to change the world. i need to study lot of books for that.so pls provide free access for all pdf document in this premium access.. so as soon as possible pls sign my account. 1. Algorithmic structure for the stream cipher has been designed.…

    • 1054 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Dynamic Source Routing

    • 375 Words
    • 2 Pages

    In this technical paper a session based symmetric key cryptographic technique, termed as SBSKCT, has been proposed. This proposed technique is very secure and suitable for encryption of large files of any type. SBSKCT considers the plain text as a string with finite no. of binary bits. This input binary string is broken down into blocks of various sizes (of 2k order where k = 3, 4, 5, ….). The encrypted binary string is formed by shifting the bit position of each block by a certain values for a certain number of times and from this string cipher text is formed. Combination of values of block length, number of blocks and no. of iterations generates the session based key for SBSKCT. For decryption the cipher text is considered as binary string. Using the session key information, this binary string is broken down into blocks. The decrypted binary string is formed by shifting the bit position of each block by a certain values for a certain number of times and from this string plain text is reformed.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Metasploit Unleashed

    • 480 Words
    • 2 Pages

    In this part of the lab we will take a lun/luns presented to your Windows host(s) and make them available for use: 1. Select: Start  Administrative Tools  Computer Management Under the Storage folder select Disk Management. Your disks/luns should show in the pane with disk numbers (Disk1 Disk 12 in the 1, example). Disks initially presented to a Windows 2008 host will display as Offline.…

    • 480 Words
    • 2 Pages
    Satisfactory Essays