0% found this document useful (0 votes)
51 views30 pages

Lab 1 Bis

The document provides instructions for securing files, folders, and applications from unauthorized access on a local computer and network. It discusses hiding files and folders, setting access permissions for users and groups, and using passwords to restrict editing of files in applications like Word, Excel and Access. Specific techniques covered include hiding columns and sheets in Excel, setting database passwords in Access, and restricting editing ranges while allowing viewing in shared Excel files. The goal is to teach fundamental data protection methods to control access and prevent unauthorized viewing or editing of sensitive information.

Uploaded by

Aslan Ydryshev
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views30 pages

Lab 1 Bis

The document provides instructions for securing files, folders, and applications from unauthorized access on a local computer and network. It discusses hiding files and folders, setting access permissions for users and groups, and using passwords to restrict editing of files in applications like Word, Excel and Access. Specific techniques covered include hiding columns and sheets in Excel, setting database passwords in Access, and restricting editing ranges while allowing viewing in shared Excel files. The goal is to teach fundamental data protection methods to control access and prevent unauthorized viewing or editing of sensitive information.

Uploaded by

Aslan Ydryshev
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 30

Basics of Informational Security (IITU/Fall, 2012) Lab1 (?

POINTS) YOUR TASK: Absorb the funds of systematic data protection: hiding files and folders, network and local access control policy (levels of user and group manager), locking of the computer. Complete the tasks. USEFUL INFORMATION: Basic data protection from unauthorized access and read - hiding the data, system, password and cryptographic protection. The Windows operating system inherited from its predecessor, MS DOS opportunity not show the names of files and folders in list comprehensions windows file monitors (Explorer, My Computer, Windows (Total) Commander etc.). If the computer - the network workstation, so the Power User rights can be given to the host of hidden files and folders by sysadmin to management Windows and file monitors settings, including the installation of concealment, in contrast to other users for which these settings are not available, and hidden files and folders will not be visible. The user need only one thing - ask the system administrator with a request for the rights of the average user.

Sample Solution
Hiding files and folders

To hide a file or folder you should:

open the context menu, right-clicking on the folder or file that you want to classify.

select the context menu Properties.

in subparagraph Common tick the Hidden attribute.

then Apply - OK

If there is data in the folder, then pops up a window:

In this case, just click OK to continue.

In order to the files and folders will not be displayed in the windows you should:

in the menu bar of open window select Tools.

in subparagraph View select the item Not show hidden files and folders.

then Apply OK.

Network Access Protection

In the case when there is a need to open access to the folder to other users, as much as possible should minimize the chance of cracking.

To do this, follow these steps:

Call the popup menu, click Properties to select the Access tab.

in the Access window you should put switch in the position of Grant public access to this folder.

click Permissions.

to allow Full access to the folder, tick the box to next paragraph Full access.

remove the Everyone group.

using the Add button start organizing your group.

in the selection window Object Types button, select the user type.

Using Advanced button expand the selection window.

select the group and click OK.

back in the window, click OK to go to the final result.

to disable the caching of data, remove the check from the command enable caching of files and folders.

Protection of local access

To protect data from local access you should:

create user accounts by using the commands: Start / Control Panel / User Accounts.

enable the security: Start / Control Panel / Tools / Folder.

open the View tab and uncheck Use simple file sharing (Recommended).

then in the properties of files and folders will be a new Security tab.

In it we set access levels for other users.

Locking of the computer and the Windows desktop

To lock the desktop is enough:

put a password on the account and at termination of work press the key combination Windows + L.

when returning you must select your account and enter a password known only by the owner and administrator.

A LITTLE EXTRA: Locking is useful when the user must leave the workplace without closing your open windows or turning off the computer (break, emergency call, etc.), and in his absence no one was able to take his machine and the data on it. Obviously, success locking is impossible without a password, which must first be created for all user accounts. When you lock the network workstation it is sufficient without closing working windows, simultaneously press the keys Ctrl, Alt, Delete and in the window Windows Security that opens, click the Lock. After the lock screen is automatically restored to the form in which it was before the lockout.

Can be blocked with a password screen saver at a specified time since the screen saver is active. Saver password matches the password of the user who is logged on the computer. If the logon password is not used, you can not set the screen saver password. When you put your computer in sleep mode also blocking can occur if used logon password. There is also an Internet tools that locks the desktop: Black Screen, Winsecure-IT, Access Lock, System Locker (and others) that protect the display screen from the curious eyes of unauthorized users. Basics of Informational Security (IITU/Fall, 2012) Lab 1 2 (? points) YOUR TASK: Absorb the funds of systematic data protection: protection of applications (Word, Excel, Access) from the network and local access. Absorb the funds of password protection of office applications. Master the standard tools of hiding data fragments in office applications. Complete the tasks. USEFUL INFORMATION: At the stage of saving Word, Excel, and Access files possible to organize systemic protection of folders containing these files. This technology is implemented directly in the file saving windows, if the user is endowed with the appropriate rights.

Besides these security measures are common to all applications, MS Office, in the DBMS Access are implemented specific protection measures against unauthorized access to specific database objects (tables, forms, queries, reports, macros, database) with differentiation on the user and object permissions.

Sample Solution
Password protection.

Word and Excel files:

in the window Saving the document go to Tools menu, then Security Options.

in paragraph a Password to open the file set the password.

the next time when you will load the document, the system will ask you the password.

Access files:

after creating a database go to Tools / Protection / Set the database password.

create a password.

the next time the base of the system will ask the password.

To remove the password in the Access is enough:

go to Tools / Protection / Remove Database Password.

enter the password.

Hiding data fragments.

To hide data (in specific case of the table) in Excel is enough:

hide selected parts of your document by right-clicking (dynamic memory), select Hide.

hide columns or rows: the menu bar, select Format / Row / Hide or Format / Column / Hide.

hiding books Excel: the menu bar select Tools / Protection / Hide.

hiding sheets: in the menu bar select Format / Sheet / Hide.

For the map (recovery) previously hidden fragments must:

rows, columns:

unprotect the sheet, if it was previously installed.

identify two adjacent columns or two adjacent lines between which were hidden, accordingly, columns or rows.

put your mouse over the border between the selected columns (rows) in the frame of the working field by achieving the cursor changing shape (double arrow).

Double-click the left mouse button.

sheets: in the menu bar select Format / Sheet / Show.

To protect a worksheet in Excel enough:

in the menu bar of open window select Tools.

in paragraph Protection enter the password and confirm it.

To hide data (in specific case of the table) in the Access enough:

Columns: select the column and in the menu bar select Format / Hide Columns.

Tables: select the table and call the popup menu and in the menu select Properties.

activate Hidden check box.

To display:

columns:

in the menu bar select Format / Show columns.

Then you will see a window. There is necessary to put tick the box next to those columns you want to display.

Tables:

in the menu bar select Tools / Options.

select the View tab.

Put a flag to Hidden Objects.

Basics of Informational Security (IITU/Fall, 2012) Lab 1-3 (? points) YOUR TASK: Learn the local and network protection from unauthorized editing: a) of WORD; b) books EXCEL; c) database ACCESS. Complete the tasks. USEFUL INFORMATION: Basic data protection tools from unauthorized editing - password-and system protection. The weakest ("symbolic") means of protection should be considered select check boxes Read access.

Sample Solution

To protect the WORD document from unauthorized editing will be necessary:

in the menu bar of an open document select Tools.

in subparagraph Security enter the Password to enable write.

apply Set up Protection.

in the window Protect documents in subparagraph Editing restrictions, select the Allow only this type of editing in the document. Then select the Recording changes.

use Enable protection.

in the dialog box Enable protection enter the password.

apply OK.

To remove the WORD document protection enough:

in the menu bar of an open document select Tools.

in paragraph Unprotect enter the password.

apply OK.

To deny editing part of Word constant template necessary:

from the Forms toolbar activate button

to unlock the need to apply

To protect the sheet in Excel book from editing necessary:

you need to unlock the cells of the variable leaf.

highlight the variable cells.

execute Format Cells.

uncheck Protected cell.

unprotect sheet.

in the menu bar of an open document select Tools.

in paragraph Protect select subparagraph Allow change ranges.

apply Create.

then should be noted the range and entered the password.

apply Permission then select the users or groups who will be admitted to edit the data range without a password.

after returning to the window Allow editing ranges apply OK.

To protect a workbook in Excel necessary:

in the menu bar of an open document select Tools.

in paragraph Settings select Security.

in the dialog box enter the password for changes.

confirm password.

To protect book from editing in Excel necessary:

in the menu bar of an open document select Tools.

in paragraph Protection select Protect Workbook.

a protection window that opens select the check box of the book on the structure and windows.

enter the password and confirm it.

To protect the database from unauthorized editing in Access necessary:

in the menu bar of an open document select Tools.

select the point data scheme.

after selecting the link call context menu, and choose Edit Relationship.

set flags on data integrity, and remove the flags on the Cascade Update Related Fields and Cascade Delete Related Records.

apply OK.

To protect data from unauthorized editing in the networks necessary:

call the context menu for the selected folder.

in Access paragraph select the Resolutions.

after selecting an active group of users set the read-only flag.

apply OK.

You might also like