Lab 1 Bis
Lab 1 Bis
POINTS) YOUR TASK: Absorb the funds of systematic data protection: hiding files and folders, network and local access control policy (levels of user and group manager), locking of the computer. Complete the tasks. USEFUL INFORMATION: Basic data protection from unauthorized access and read - hiding the data, system, password and cryptographic protection. The Windows operating system inherited from its predecessor, MS DOS opportunity not show the names of files and folders in list comprehensions windows file monitors (Explorer, My Computer, Windows (Total) Commander etc.). If the computer - the network workstation, so the Power User rights can be given to the host of hidden files and folders by sysadmin to management Windows and file monitors settings, including the installation of concealment, in contrast to other users for which these settings are not available, and hidden files and folders will not be visible. The user need only one thing - ask the system administrator with a request for the rights of the average user.
Sample Solution
Hiding files and folders
open the context menu, right-clicking on the folder or file that you want to classify.
then Apply - OK
In order to the files and folders will not be displayed in the windows you should:
in subparagraph View select the item Not show hidden files and folders.
In the case when there is a need to open access to the folder to other users, as much as possible should minimize the chance of cracking.
Call the popup menu, click Properties to select the Access tab.
in the Access window you should put switch in the position of Grant public access to this folder.
click Permissions.
to allow Full access to the folder, tick the box to next paragraph Full access.
in the selection window Object Types button, select the user type.
to disable the caching of data, remove the check from the command enable caching of files and folders.
create user accounts by using the commands: Start / Control Panel / User Accounts.
open the View tab and uncheck Use simple file sharing (Recommended).
then in the properties of files and folders will be a new Security tab.
put a password on the account and at termination of work press the key combination Windows + L.
when returning you must select your account and enter a password known only by the owner and administrator.
A LITTLE EXTRA: Locking is useful when the user must leave the workplace without closing your open windows or turning off the computer (break, emergency call, etc.), and in his absence no one was able to take his machine and the data on it. Obviously, success locking is impossible without a password, which must first be created for all user accounts. When you lock the network workstation it is sufficient without closing working windows, simultaneously press the keys Ctrl, Alt, Delete and in the window Windows Security that opens, click the Lock. After the lock screen is automatically restored to the form in which it was before the lockout.
Can be blocked with a password screen saver at a specified time since the screen saver is active. Saver password matches the password of the user who is logged on the computer. If the logon password is not used, you can not set the screen saver password. When you put your computer in sleep mode also blocking can occur if used logon password. There is also an Internet tools that locks the desktop: Black Screen, Winsecure-IT, Access Lock, System Locker (and others) that protect the display screen from the curious eyes of unauthorized users. Basics of Informational Security (IITU/Fall, 2012) Lab 1 2 (? points) YOUR TASK: Absorb the funds of systematic data protection: protection of applications (Word, Excel, Access) from the network and local access. Absorb the funds of password protection of office applications. Master the standard tools of hiding data fragments in office applications. Complete the tasks. USEFUL INFORMATION: At the stage of saving Word, Excel, and Access files possible to organize systemic protection of folders containing these files. This technology is implemented directly in the file saving windows, if the user is endowed with the appropriate rights.
Besides these security measures are common to all applications, MS Office, in the DBMS Access are implemented specific protection measures against unauthorized access to specific database objects (tables, forms, queries, reports, macros, database) with differentiation on the user and object permissions.
Sample Solution
Password protection.
in the window Saving the document go to Tools menu, then Security Options.
the next time when you will load the document, the system will ask you the password.
Access files:
create a password.
the next time the base of the system will ask the password.
hide selected parts of your document by right-clicking (dynamic memory), select Hide.
hide columns or rows: the menu bar, select Format / Row / Hide or Format / Column / Hide.
hiding books Excel: the menu bar select Tools / Protection / Hide.
rows, columns:
identify two adjacent columns or two adjacent lines between which were hidden, accordingly, columns or rows.
put your mouse over the border between the selected columns (rows) in the frame of the working field by achieving the cursor changing shape (double arrow).
To hide data (in specific case of the table) in the Access enough:
Columns: select the column and in the menu bar select Format / Hide Columns.
Tables: select the table and call the popup menu and in the menu select Properties.
To display:
columns:
Then you will see a window. There is necessary to put tick the box next to those columns you want to display.
Tables:
Basics of Informational Security (IITU/Fall, 2012) Lab 1-3 (? points) YOUR TASK: Learn the local and network protection from unauthorized editing: a) of WORD; b) books EXCEL; c) database ACCESS. Complete the tasks. USEFUL INFORMATION: Basic data protection tools from unauthorized editing - password-and system protection. The weakest ("symbolic") means of protection should be considered select check boxes Read access.
Sample Solution
in the window Protect documents in subparagraph Editing restrictions, select the Allow only this type of editing in the document. Then select the Recording changes.
apply OK.
apply OK.
unprotect sheet.
apply Create.
apply Permission then select the users or groups who will be admitted to edit the data range without a password.
confirm password.
a protection window that opens select the check box of the book on the structure and windows.
after selecting the link call context menu, and choose Edit Relationship.
set flags on data integrity, and remove the flags on the Cascade Update Related Fields and Cascade Delete Related Records.
apply OK.
apply OK.