0% found this document useful (0 votes)
48 views12 pages

Nis Practical QB

Uploaded by

omyadavcool8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views12 pages

Nis Practical QB

Uploaded by

omyadavcool8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

NIS PRACTICAL QB

1] Install and configure antivirus software on system.


 Choose Antivirus: Pick an antivirus program you like.
 Download: Get it from their website.
 Install: Double-click the downloaded file and follow the
instructions.
 Update: Open the antivirus program, find the update option, and
click to update virus definitions.
 Scan: Look for a "Scan" button, click it, and choose "Full Scan".
 Real-Time Protection: Make sure it's turned on in the settings.
 Done!: Your antivirus is now installed and protecting your system.
Keep it updated and scan your system regularly.
Remember, keeping your antivirus updated and performing regular
scans is key to staying protected.
2] Set up operating system update.
 Open Windows Update: Click the Start button, type "Update", and
select "Windows Update" or "Check for updates".
 Check for Updates: Click "Check for updates" and wait while
Windows searches for the latest updates.
 View Important Updates: If you see a message about important
updates, click it to view and select them.
 Select Updates to Install: In the list, click on important updates for
more information. Check the boxes for updates you want to install.
 Install Updates: Click "OK", then click "Install updates" to start the
installation process.
That's it! Windows will download and install the selected updates
automatically. Remember to restart your computer if prompted to
complete the installation.
3] Perform the backup and restore system
Performing Backup:
 Connect External Drive: Plug in an external hard drive where you
want to store your backup.
 Open Backup Settings: Click Start, type "Backup settings", and
select it.
 Choose Backup Destination: Click "Add a drive" and select your
external drive.
 Select What to Backup: Under "Back up these folders", choose the
folders or files you want to back up.
 Start Backup: Click "Back up now" to begin the backup process.

Performing Restore:
 Open Backup Settings: Click Start, type "Backup settings", and select
it.
 Access Restore Options: Click "More options" and then "Restore files
from a current backup".
 Choose Backup: Select the backup location from which you want to
restore your files.
 Select Files to Restore: Browse through the backup and choose the files
or folders you want to restore.
 Start Restore: Click "Restore" to begin restoring the selected files.

4] Setup Password to the Operating System and Application


Setting Up Password for Operating System (Windows):
 Open Settings: Click on Start, then click on the gear icon (Settings).
 Accounts: Click on "Accounts".
 Sign-in Options: Choose "Sign-in options".
 Set Password: Click on "Password", then click "Add" or "Change" to
create your password.
 Enter Password: Type your desired password and confirm it.
 Optional: You can set up security questions for password recovery if
you wish.

Setting Up Password for Applications (e.g., Microsoft Office):


 Open Application: Open the application you want to password-
protect (e.g., Microsoft Word).
 Find Options or Preferences: Look for "Options" or "Preferences"
in the menu.
 Security Settings: Navigate to "Security" or "Privacy" settings.
 Set Password: Look for an option to set a password or enable
password protection.
 Enter Password: Enter your chosen password.
 Save: Save your changes.

5] Apply security to file folder or application using access


permission and verify.
Applying Security to a File or Folder:
 Right-click: Right-click on the file or folder you want to secure.
 Select Properties: Choose "Properties" from the context menu.
 Security Tab: Click on the "Security" tab in the Properties window.
 Edit Permissions: Click "Edit" to change permissions.
 Add Users or Groups: Click "Add" and select users or groups to
add.
 Choose Permissions: Select the users or groups and choose the type
of access (Read, Write, etc.).
 Apply Changes: Click "Apply" to save changes.

Applying Security to an Application (Executable File):


 Right-click: Right-click on the application's executable file (".exe").
 Select Properties: Choose "Properties" from the context menu.
 Security Tab: Click on the "Security" tab in the Properties window.
 Edit Permissions: Click "Edit" to change permissions.
 Add Users or Groups: Click "Add" and select users or groups to
add.
 Choose Permissions: Select the users or groups and choose the type
of access (Read, Write, etc.).
 Apply Changes: Click "Apply" to save changes.
That's it! You've now applied security using access permissions.

6] Write a program to implement Caesar Cipher


 Define the Alphabet: Create a string containing the alphabet.
 Prompt User Input: Ask the user to enter the message they want to
encrypt or decrypt, along with the shift value.
 Encrypt or Decrypt: Based on the user's choice, shift each letter in
the message by the specified amount.
 Display Result: Output the encrypted or decrypted message.
7] Write a program to implement Vernam Cipher
 Generate Key: Create a random key with the same length as the
message.
 Convert Message and Key to Binary: Convert the message and the
key into binary format.
 Perform XOR Operation: Perform an XOR operation between each
bit of the message and the corresponding bit of the key.
 Convert Back to Text: Convert the result of the XOR operation back
to text format.
 Display Result: Output the encrypted message.

8] Create and Verify Hash Code for given message.


Creating Hash Code:
 Choose Hashing Algorithm: Select a hashing algorithm (e.g., MD5,
SHA-1, SHA-256) to use for generating the hash code.
 Hash the Message: Apply the chosen hashing algorithm to the
message to generate the hash code.
 Output Hash Code: Display or store the generated hash code.
Verifying Hash Code:
 Retrieve Original Message and Hash Code: Obtain both the
original message and the hash code generated for it.
 Re-hash the Message: Re-apply the same hashing algorithm to the
original message to generate a new hash code.
 Compare Hash Codes: Compare the newly generated hash code with
the original hash code.
 Verification: If the hash codes match, the message is verified;
otherwise, it may have been tampered with.
9] Write a program to implement Rail fence technique.
Encryption:
 Input Message and Number of Rails: Get the message and decide
how many rails (lines) to use.
 Create Empty Rails: Make as many lines as the number of rails you
chose.
 Fill Rails: Write each character of the message in a zigzag pattern,
going up and down across the rails.
 Concatenate Rails: Read the characters row by row to get the
encrypted message.

Decryption:
 Input Ciphertext and Number of Rails: Get the encrypted message
and the number of rails used.
 Calculate Rail Length: Divide the ciphertext into groups based on
the number of rails.
 Fill in Characters: Put each group of characters into the appropriate
rail.
 Read Off Decrypted Message: Read the characters diagonally to get
the decrypted message.
10] Write a program to implement Simple Columnar
transposition Technique.

Encryption:
 Input Message and Key: Get the message and the encryption key.
 Arrange Message in Columns: Write the message in rows under the
key, filling the columns one by one.
 Sort Columns by Key: Rearrange the columns of the message
alphabetically based on the letters of the key.
 Concatenate Columns: Read the characters column by column to get
the encrypted message.

Decryption:
 Input Ciphertext and Key: Get the ciphertext and the encryption
key.
 Calculate Column Order: Determine the order of the columns based
on the letters of the key.
 Rearrange Columns: Rearrange the columns of the ciphertext based
on the calculated order.
 Read Off Decrypted Message: Read the characters row by row to
get the decrypted message.
11] Use Steganography to encode and decode the message
using any tool.
Encoding a Message:
 Choose an Image: Pick any picture you like. It could be a photo of
your pet, a landscape, or anything else.
 Think of a Message: Decide on a short message you want to hide. It
could be a simple phrase, a joke, or a secret note.
 Use an Online Tool: Go to a steganography website or app. Many
websites offer easy-to-use tools for free.
 Upload the Image: Upload the picture you chose earlier to the
steganography tool.
 Enter Your Message: Type in the message you want to hide in the
provided text box.
 Encode the Message: Look for a button or option that says "Encode"
or "Hide". Click it to encode your message into the image.
 Download the Encoded Image: After encoding, the tool will provide
you with a download link. Click it to save the newly encoded image
to your device.

Decoding a Message:
 Open the Encoded Image: Locate the image file you downloaded
after encoding.
 Use the Same Online Tool: Go back to the steganography website or
app you used earlier.
 Upload the Encoded Image: Upload the image file containing the
hidden message.
 Decode the Message: Look for an option that says "Decode" or
"Reveal". Click it to start the decoding process.
 View the Hidden Message: Once the decoding is done, the tool will
show you the hidden message. Read and enjoy your secret message!
12] PGP Email Security Generate Public and Private Key
Pair.
Generating a Public and Private Key Pair:
 Install GnuPG (GNU Privacy Guard): Download and install
GnuPG from its official website or using your computer's app store.
 Open GnuPG Key Manager: Open the GnuPG Key Manager
application on your computer.
 Generate a New Key Pair: Click on the option to generate a new
key pair.
 Enter Your Name and Email: Enter your name and email address.
This information will be associated with your public key.
 Set a Passphrase: Set a passphrase to protect your private key.
Choose something easy for you to remember but difficult for others to
guess.
 Click Generate: Click the button to generate your key pair. GnuPG
will create a new public and private key for you.
 Backup Your Keys: Once the key generation is complete, make sure
to backup both your public and private keys. You can usually export
them to a file for safekeeping.

13] PGP Email Security Encrpty and Decrypt message using


key pair.
Encrypting a Message:
 Open GnuPG or Email Client: Open the GnuPG application on
your computer or use email client integration if available.
 Select Recipient's Public Key: If you're sending the message to
someone else, select their public key. You can import it into GnuPG
or use email client integration.
 Compose Your Message: Write the message you want to send to the
recipient.
 Encrypt the Message: In GnuPG or your email client, choose the
option to encrypt the message using the recipient's public key.
 Send the Encrypted Message: Once the message is encrypted, send
it to the recipient through your preferred communication channel.

Decrypting a Message:
 Receive the Encrypted Message: Receive the encrypted message
from the sender through your preferred communication channel.
 Open GnuPG or Email Client: Open the GnuPG application or use
email client integration.
 Select Your Private Key: Make sure you have your private key
imported into GnuPG or configured in your email client.
 Decrypt the Message: Choose the option to decrypt the encrypted
message using your private key.
 View the Decrypted Message: Once decrypted, view the message in
its original, readable form.

You might also like