Boot/Shutdown & User interfaces/Desktops You are working as a Linux technician and you just got a visit from the information security officer (ISO) at your company. Apparently, an unauthorized person gained access to some files on the receptionist’s computer. The security officer thinks it happened during the boot process as he went through the entire system and found no vulnerabilities that would have allowed someone to hack the system. You know that anyone can access files during the GRUB boot process. For this exercise, write a technical memo to the information security officer to explain to him HOW someone might gain access to files during the GRUB boot process and provide him with a solution to the problem. In your memo, also provide the ISO with step-by-step instructions so that she can secure systems herself in the future.
Get Free Quote!
438 Experts Online