Lab3_S3-1
.docx
keyboard_arrow_up
School
Northern Kentucky University *
*We aren’t endorsed by this school
Course
285
Subject
Computer Science
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by Lukem11568
CIT 438 Cloud Computing
Lab#03: AWS S3
In this lab, you will study the Amazon S3. You will use the aws s3 and s3api commands to manage data in Amazon S3. Tools and Materials
1.
One CentOS VM on the vSphere servers. 2.
Amazon AWS security credentials
3.
Aws CLI
Note: You need to replace words in italics
with your information.
Part 1: Basic Operations with S3 Start your VM image on the vSphere server. Log in as cit438 with password cit438. Please su to root in a terminal (the password is cit438). Assume your current directory is /home/cit438.
1. List all buckets owned by the user via the ls command. aws s3 ls
What is the output? No output popup up 2. Make a bucket via the following mb command: aws s3 mb s3://
your_user_name
What is the output?
make_bucket: Lukem1
3. List the contents of the bucket via the following ls command:
aws s3 ls s3://
your_user_name
What is the output? no output 1
4. Create a directory named webpages. Go to the webpages directory. Use vi or other text editor to create a simple html file called hello.html. The content of the file is as follows: <html><body><h1>Amazon S3</h1>
Hello World!
</body></html>
Upload the file into the bucket and make the file available to the public via the following command: I was hoping to get an updated lab from Dr. Hao in Week 4 but
that was not possible so I am going with the workaround from
last semester.
Amazon has made a change to the way S3 ACL's work. You will get "The bucket does not allow ACLs" or something similar.
We are basically removing a protection that would allow anyone
who knew the bucket url to access files in the bucket.
This is dangerous in real world situation so keep that in mind. This has led to many incidences of personal data being found on the internet.
Below are the commands to allow.
aws s3api put-public-access-block --bucket <you-user-name> --public-access-block-configuration 'BlockPublicAcls=false,IgnorePublicAcls=false,BlockPublicPolicy=false,RestrictPublicBuckets=false'
aws s3api put-bucket-ownership-controls --bucket <your-user-name> --ownership-controls 'Rules=[{ObjectOwnership="BucketOwnerPreferred"}]
'
aws s3 cp hello.html s3://
your_user_name
--acl public-read
What is the output?
upload: ./hello.html to s3://Lukem1/hello.html
5. Amazon S3 is object storage over the Internet. The S3 object is accessible over the Internet. Open a browser and access to http://s3.amazonaws.com/
your_user_name
/hello.html. What did you see in the browser?
Part 2: Static Website Hosting with S3 6. Let’s enable the bucket for static website hosting. Create two html files under the current directory. One file is named index.html. Its content is as follow:
<html><body>
This is an index page!
</body></html>
2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Hi please assist with a and b
please explain in detail.
thanks
arrow_forward
Hi please assist with a ,b thanks
arrow_forward
you must provide training videos for the networking staff using Windows Server 2019. Additionally, these videos will be hosted on an Apache web server running on Ubuntu Server 20. Find a cloud service provider that will allow you to create 4 VMs: 2 of these VMs will be the two OS from scenario 1 moved to the cloud, the third VM will be running Windows Server 2019, and the fourth VM will be for the Apache web server hosting all of the videos.
justifying the cost of the solution, and analyzing the security aspects (good/bad) of the solution.
arrow_forward
Do you agree with the argument, "There is no notion of client and server sides of a contact session" for a P2P file-sharing application? If so, why or why not?
arrow_forward
Please help me with the answer below with detailed explanation. if you copied and pasted from other answers, I will rate down and report it. Project Part 2: Firewall Selection and Placement Scenario The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach. Tasks For this part of the project, perform the following tasks: Research and select firewalls for the Corporation Techs network. a. Describe each firewall (This is not refering to the brand), why you selected it, and where it should be placed for maximum effectiveness. b. Address network, server, and workstation firewalls. Describe a plan for creating a DMZ and explain how it makes the network more secure. Research network authentication and create a…
arrow_forward
MCQ 6: Which of the following AWS security features is associated with an EC2 instance and functions to filter incoming traffic requests?
(A) Security Groups
(B) cli
arrow_forward
Assume that it is on a networka DNS server (DNS)a Host (H) with a browser clientand a Web server called www.olles.se (Links to an external site.) (S)From the host's browser, a request is sent to www.olles.se (Links to an external page.)Which packages are sent and in which order(1) (2) etc. indicates the order(nothing is cached)Group of answer options
(1) H to DNS, (2) DNS to H, (3) H to S, (4) S to H
(1) H to DNS, (2) DNS to S, (3) S to H
(1) H to DNS, (2) DNS to S, (3) S to DNS, (4) DNS to H
(1) H to DNS, (2) DNS to H, (3) H to S, (4) S to DNS (5) DNS to H
arrow_forward
html or asp --- 6
arrow_forward
For a P2P file-sharing application, do you agree with the statement, "There is no notion of client and server sides of a communication session"? Why or why not?
arrow_forward
How does the "peerDependencyMeta" field enhance the flexibility of peer dependencies in packages?
arrow_forward
True or False
7. A hybrid cloud infrastructure offers tighter controls over the geographic location of data storage and other aspects of security.
arrow_forward
Hi please assist with a and b
arrow_forward
Add smtp services to firewalld and list the firewall services
linux commands only
arrow_forward
please don't repost from chegg.
arrow_forward
Brute Attack on FTP server (KALI -LINUX)
The file you downloaded contains the 100 most common passwords. Load the file in the Metasploit framework by setting the PASS_FILE variable. When you run the command, after some time, you will see a connection error and it says ‘scan complete’ but in reality, it is not. Why do you think that the first few scans went unsuccessful and then the connection error appears? Verify your answer using a log file generated at the victim’s machine. Furthermore, explain how you can circumvent this problem and show at least one working solution.
Upload the log file generated at the victim's machine which shows the first few scans went unsuccessful and then the connection error appears.
Also, include your answer and explain how you can avoid this problem.
arrow_forward
1. Why would you not restore a Domain Controller that was last backed up twelve months ago?
2. Outline five data repository models that can be adopted by your company and recommend one.
3. What is the difference between a symbolic link and a hard link?
4. You have an application that take too long to execute, and do not require user interaction. As a systems administrator how will you ensure the execution of this application does not continue to interfere will current application on your desktop.
5. While the server is booting up you have some error messages. How do you view these messages that are stored in the kmsg buffer?
arrow_forward
Show and upload your SOLUTION.
Code a descriptor that starts at BDADE9H that ends at BDBF7AH. The segment follows the highest privilege level and is able to read. Include the starting address, ending address and limit.
arrow_forward
a^A stream cipher using XOR based encryption along with a key stream is to be used to secure a communications link. What is the key stream and what property
must it have to ensure the link is secure?
arrow_forward
Directions: Using different references available such as articles, books, internet andpublications, investigate and search for the advantages and disadvantages ofnetwork security.
arrow_forward
Create two tutorials for Help Desk interns, describing how to set up web technologies for the new operating system for use with a specific web browser. Prepare one tutorial for setting the company website as the employees' homepage. The second tutorial should describe how to enable and disable cookies.
arrow_forward
SELECT superglobals from the list below. There are more than one correct answer!
$.COOKIE
OS. GET
O S. POST
O $ SUPERMAN
O$ YOURINSTRUCTOR
O S. FILES
Question 26
When is a good tíme to use the HTTP GET method?
There are more than one correct answer!
O When the request is for a page that gets data from a database server
O When the request can be executed multiple times without causing problems
O When the request is for a page that writes data to a database server
O When executing the request multiple times may cause problems
O When you don't want to include the parameters in the URL for security reasons
O When you don't want users to be able to include parameters when they bookmark a page
O When you need to transfer more than 4KB of data
arrow_forward
Display a way to call students.blade.php from studentscontroller
arrow_forward
@@@@@
Scenario 1: You are an Application Security Analyst recently your manager asked you to work with the application development team to assist and meet the security requirements for the upcoming projects. The application team wants you to highlight the secure password requirements for the application in development. Based on your knowledge highlight the authentication process in Windows, like the hashing function, encryption standard etc.
answer with in 4-6 line
answer with in 4-6 line
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Related Questions
- Hi please assist with a and b please explain in detail. thanksarrow_forwardHi please assist with a ,b thanksarrow_forwardyou must provide training videos for the networking staff using Windows Server 2019. Additionally, these videos will be hosted on an Apache web server running on Ubuntu Server 20. Find a cloud service provider that will allow you to create 4 VMs: 2 of these VMs will be the two OS from scenario 1 moved to the cloud, the third VM will be running Windows Server 2019, and the fourth VM will be for the Apache web server hosting all of the videos. justifying the cost of the solution, and analyzing the security aspects (good/bad) of the solution.arrow_forward
- Do you agree with the argument, "There is no notion of client and server sides of a contact session" for a P2P file-sharing application? If so, why or why not?arrow_forwardPlease help me with the answer below with detailed explanation. if you copied and pasted from other answers, I will rate down and report it. Project Part 2: Firewall Selection and Placement Scenario The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach. Tasks For this part of the project, perform the following tasks: Research and select firewalls for the Corporation Techs network. a. Describe each firewall (This is not refering to the brand), why you selected it, and where it should be placed for maximum effectiveness. b. Address network, server, and workstation firewalls. Describe a plan for creating a DMZ and explain how it makes the network more secure. Research network authentication and create a…arrow_forwardMCQ 6: Which of the following AWS security features is associated with an EC2 instance and functions to filter incoming traffic requests? (A) Security Groups (B) cliarrow_forward
- Assume that it is on a networka DNS server (DNS)a Host (H) with a browser clientand a Web server called www.olles.se (Links to an external site.) (S)From the host's browser, a request is sent to www.olles.se (Links to an external page.)Which packages are sent and in which order(1) (2) etc. indicates the order(nothing is cached)Group of answer options (1) H to DNS, (2) DNS to H, (3) H to S, (4) S to H (1) H to DNS, (2) DNS to S, (3) S to H (1) H to DNS, (2) DNS to S, (3) S to DNS, (4) DNS to H (1) H to DNS, (2) DNS to H, (3) H to S, (4) S to DNS (5) DNS to Harrow_forwardhtml or asp --- 6arrow_forwardFor a P2P file-sharing application, do you agree with the statement, "There is no notion of client and server sides of a communication session"? Why or why not?arrow_forward
- How does the "peerDependencyMeta" field enhance the flexibility of peer dependencies in packages?arrow_forwardTrue or False 7. A hybrid cloud infrastructure offers tighter controls over the geographic location of data storage and other aspects of security.arrow_forwardHi please assist with a and barrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning