Cyber (Lab)
Cyber (Lab)
Write the steps for creating the User account, setting permissions and protecting
your files with password.
Introduction
In case there is no Active Directory or LDAP in your environment, you will need to
add local users to one or two of servers such as an FTP Servers.
Click on your Windows Start button and search for “Server Manager” in-case it is
not fired up already.
In this window, expand “Local Users and Groups” then right-click on “Users” and
select “New User“.
Choose the one that makes sense to you then proceed to click on “Create” to create
the user and then close after you are through.
This is in case you would wish your user to be an Administrator. Click on the “Users”
folder still in “Computer Management” to expose all of the users. Right-click the
name of the specific user and select “properties".
Step 5: Configure
Once you click on “properties” in the previous step, a new “username properties”
window will come up. While in the window, click on “member of” tab then “Add“. You
should see a smaller “Select Groups” window. Type in “Administrators” and on
“Check Name“. If the group is found within the Server, click on “OK“.
Conclusion
It has been a smooth session and we now have our local users added to the
Server.setting permissions and protecting your files with password.
Password-protect a folder
Using a password to protect a folder means that you need to enter a password to
see the list of documents in the folder.
Windows 7
When you hide a folder or file in Windows, the folder or file does not appear in the
directory list, unless the Don't show hidden files, folders, or drives setting is
unchecked.
Windows 7, 8, and 10
1. Right-click on the file or folder that you want to hide. Select Properties.
2. Click the General tab, under the Attributes section, check Hidden.
3. Click Apply.
If the file or folder remains visible in the directory, you will need to enable another
setting.
To see your hidden files or folder, repeat the instructions above, but click Show
hidden files, folders, and drives.
Conclusion
Although Microsoft has taken away the ability to password-protect a folder, you can
still keep your confidential information private by using either a password-protected
zipped folder or hiding files and folders so they don't appear in the directory list.
2Q: Write the steps for disk partitioning and perform operations like shrinking, Extending,
deleting and formatting?
Ans: After installing Windows 10, we need to partition hard drive in Disk Management to
distribute more free space for Windows 10 future use. If you have unallocated space on
your hard drive, it's ok to create partition with it without data loss, but if you have no such
space available, you have to split exist partition into partitions, in Windows 10 Disk
Management, Delete Volume is the function you shall use, which will not keep data when
operating.
1. Press Windows bottom and type disk management in search box to open Disk
Management.
2. Right-click on unallocated space and select New Simple Volume; follow New Simple
Volume Wizard.
3. Confirm Simple Volume size, assign drive letter, format volume with file system,
allocate unit size (cluster size), Volume label, and perform a quick format, Finish.
When a new window pops up, it means you succeed, this window is file explorer of the
volume you created.
2. Merge partitions
Windows 10 Disk Management has no function called Merge Partitions, but we simulate it
in Disk Management, without the help of any third-party partition software, the thoery is to
maunally copy everything from one partition to another, delete one partition, merge the
free space to another
● Delete Volume
● Extend Volume
Ransomware is a subset of malware that can lock and encrypt data on a victim's
computer. Attackers then notify the victim that an exploit has occurred and the data
will not be unlocked or decrypted until a payment is received.
Types of Ransomware
Ransomware vectors
Phishing
Phishing, which targets an organization by embedding malware in email, remains
one of the most popular ways for cybercriminals to deliver their payload.
1. education
2. retail
3. business, professional and legal services
4. central government (including federal and international)
5. IT
6. manufacturing
7. energy and utilities infrastructure
8. healthcare
9. local government
10. financial services
Some of the most notable ransomware attacks include the following recent victims:
1. An attack on Colonial Pipeline led to a multiday disruption of the fuel supply for a
large swath of the East Coast. Colonial paid a $4.4 million demand to speed its
recovery efforts. Some of that payment, made in cryptocurrency, was
later recovered by the U.S. government.
2. Global beef manufacturer JBS USA had to shutter operations for several days
after it was hit by a ransomware attack. The company paid attackers $11 million to
ensure no data was exfiltrated.
3. The Buffalo Public Schools system in New York ceased instruction -- in-person
and online -- in the wake of a crippling ransomware attack. The system required a
week to get back on its feet and resume classes.
Ans Once you have decided to migrate to open source software, you will need to do some
basic installing. Installing open source software depends on your operating system. read
the appropriate section for your OS. Use the OS package manager to install pre-built
softwares. This is always recommended. Viz.,
Installing of Software from Paid Subscription Model is similar to installing from Open
Source, the only difference is that your need to PAY in Subscription Model.
• Go to the Website
• Check for required Software
• Subscribe and Pay for the Software
• Download and Run the Installer
• Once Installed Shortcuts will be created.
Q5. Write steps to make Microsoft Chrome as default browser, Add Active X Controls
and Add-on to the Browser.
Ans For Windows 10 the following steps are to be done for adding Microsoft Chrome as
default browser.
Step 1
Click on the Google Chrome menu option (three horizontal or vertical lines / dots, depending
on which version you have installed).
Step 3
Click on Settings.
Step 4
Step 6
Select Open proxy settings and a new pop-up window will appear.
Step 7
Click the Security tab and select Custom Level (located under the Security Level section
From there you will be able to see all the security settings that you can change. Scroll
down and select the Prompt option for the “Download signed ActiveX controls” and
“Download unsigned ActiveX controls” sections. Also make sure that the Enable option
has been checked in the “Run ActiveX control and plug-ins” section.
Click on ‘Okay‘ and restart your browser for the changes to be saved.
Web browser plugins and add-ons are programs integrated into your web
browser and extending its capabilities. For example, you can use them to view
media content on a web page, receive news and mail, download files, block
undesired pop-up windows, and so on.
To Install an extension
1. Open the Chrome Web Store.
2. Find and select the extension you want.
3. Click Add to Chrome.
4. Some extensions will let you know if they need certain permissions or data. To
approve, click Add extension. Important: Make sure you only approve extensions
that you trust.
1. With the computer off, install the NIC card in an open bay (Slot 1 is
recommended) 2. Start the Computer
3. Open up the Control Panel
4. Click on Add New Hardware
5. Click the Next button
6. You can either have Windows95 search for the adapter by selecting YES or select NO to
manually enter the adapter
7. Click the Next button
8. If you selected NO, you will need to manually select an adapter.
9. If you have a driver diskette for your network adapter, use it to install the appropriate
driver for your NIC card 7. Reboot if requested
1. You will need to decide which protocol stack you want to use for your local network.
2. If you are going to be totally isolated and never dial-up to the Internet, you could use
NetBEUI or IPX.
3. If you are going to dial to the Internet, you can select TCP/IP and just assign dummy IP
addresses for your local LAN. This way you only need to install one protocol stack. You
can also have NetBEUI or IPX as well as TCP/IP installed. NetBEUI or IPX would be used
for your local LAN and TCP/IP for the Internet Dial-Up.
4. Open the Control Panel
5. Double-click on the Network icon
6. From your network adapter detection in previous table, you should have Client for
Microsoft Networks, Client for Netware, your Adapter, IPX and NetBEUI already
installed.
7. If you just want NetBEUI, highlight and remove IPX or vice versa.
8. If you want to add TCP/IP, click on the Add button
9. Click on Protocol
10. Click on Microsoft
11. Click on TCP/IP
1. Under Control Panel / Network / Identification make sure each Computer has a unique
name.
2. Make sure that the Workgroup name is the SAME for all computers.
3. Do not have any spaces in either the Computer or Workgroup names. Keep them simple.
4. If you have TCP/IP installed, select different IP address with the same subnet mask. You
do not need to fill in WINS, Gateway, or DNS IP addresses.
5. Click on the File and Print Sharing button and check off whether you want share Files or
Printers.
Sharing Resources will allow you connect to another to computer to transfer files or use its
printer.
To Connect to a printer configured and attached to another computer on the network, the
printer must be configured as a shared device on the computer that it is attached to.
Before you can set up your wireless network, here’s what you’ll need:
Wireless router. A router sends info between your network and the Internet. With a
wireless router, you can connect PCs to your network using radio signals instead of wires.
There are several different kinds of wireless network technologies, which include 802.11a,
802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ax.
Wireless network adapter. A wireless network adapter is a device that connects your PC to
a wireless network. To connect your portable or desktop PC to your wireless network, the
PC must have a wireless network adapter.
Select Start , type device manager in the search box, and then select Device Manager.
After you have all the equipment, you'll need to set up your modem and Internet
connection. your Internet service provider (ISP), follow the instructions that came with your
modem to connect it to your PC and the Internet. If you're using Digital Subscriber Line
(DSL), connect your modem to a phone jack. If you're using cable, connect your modem to a
cable jack.
Change the default user name and password. This helps protect your router. Most router
manufacturers have a default user name and password on the router and a default network
name (also known as the SSID). Someone could use this info to access your router without
you knowing it. To help avoid that, change the default user name and password for your
router.
Set up a security key (password) for your network. Wireless networks have a network
security key to help protect them from unauthorized access. We recommend using Wi-Fi
Protected Access 3 (WPA3) security if your router and PC support it. See the documentation
for your router for more detailed info, including what type of security is supported and how
to set it up.
Some routers support Wi-Fi Protected Setup (WPS). If your router supports WPS and it’s
connected to the network, follow these steps to set up a network security key:
▪ In Windows 10, select Start , then select Settings > Network & Internet > Status > Network
and Sharing Center.
2. In the list of networks, choose the network that you want to connect to, and then
select Connect.
If you have problems with your Wi-Fi network when using Windows 10, see Fix Wi-Fi
problems in Windows for advanced troubleshooting info.
Q8. Write steps to install and configure Network Components like Switches, Hub and
Modem. How do you connect to Dial-Up Networking.
Ans: After defining the switch, you can define the switch configuration, that is the "inside"
of the switch. On the Switch List, select the switch and the Work with switch configurations
action from the context menu (or action code s ). The following are the steps to configure a
Switch.
You need to start with a connection to the console port. That means configuring your
terminal emulator software and connecting your rollover cable between your switch’s
console port and your PC.
Assuming your PC’s serial port is COM1, if you use Putty and Windows, you can set the
session up like this (under the “Serial” options in the menu):
Once your cable is connected and the session is set up, click open. Then press enter to get a
response at the terminal window.
First, we access Privileged EXEC mode with the “enable” switch configuration command:
Switch>
enable
Switch#
From there, we enter Global Configuration mode with “config t” (or “configure terminal”):
Switch#config t
[Enter configuration commands, one per line. End with “CNTL/Z”.]
Switch(config)#
Switch(config)#interface vlan 1
Switch(config-if)#
Be sure to replace that with the correct values for your switch!
We can exit interface configuration mode and assign a default gateway for the switch from
global configuration mode.
Switch(config-if)#exit
Switch(config)#ip default-gateway 10.10.11.1
Switch(config)#
Step 3: Set hostname and domain name
In addition to setting the IP address of the switch, you should give it a logical hostname. To
do that, we enter global configuration mode and use the hostname command:
Switch(config)#hostname PepperAndEggSwitch
PepperAndEggSwitch(config)#
Similarly, we can also add a domain name with the domain command:
PepperAndEggSwitch(config)#line vty 0 15
PepperAndEggSwitch(config-line)#password BigSecretDon'tT3ll@ny1
PepperAndEggSwitch(config-line)#
Next, we’ll exit the VTY configuration, access console line 0, and assign it a separate
password:
PepperAndEggSwitch(config-line)#exit
PepperAndEggSwitch(config)#line console 0
PepperAndEggSwitch(config-line)#password BigSecretForConsoleDon'tT3ll@ny1
PepperAndEggSwitch(config-line)#
PepperAndEggSwitch(config-line)#exit
PepperAndEggSwitch(config)#enable secret Top$ecretPrivEXECpassWORD
PepperAndEggSwitch(config)#
Note: Because switch security is a complex topic, and we’re focused on the basics, we
won’t go intouser managementhere. However, be sure to properly configure users or
remote authentication servers before a production deployment.
Now, we can set SSH up on specific VTY lines. I’ll use the first 6 lines here:
PepperAndEggSwitch(config)#line vty 0 5
PepperAndEggSwitch(config-line)#transport input ssh
Finally, we’ll tell the switch to check the local users’ database to authenticate users:
PepperAndEggSwitch(config-line)#login local
PepperAndEggSwitch(config-line)#
Step 7: Create VLANs
One of the most obvious reasons to use a managed switch is the ability to create VLANs
to separate network segments. We can do that by using the vlancommand, and then
assigning our VLAN a name. For example, to create VLAN 2 and name it “cafe”:
PepperAndEggSwitch(config-line)#vlan 2
PepperAndEggSwitch(config-vlan)#name cafe
PepperAndEggSwitch(config-vlan)#
You can now exit, and repeat these steps for as many VLANs as you need.
PepperAndEggSwitch(config-vlan)#exit
PepperAndEggSwitch(config)#interface range fast
PepperAndEggSwitch(config)#interface range fastEthernet 0/5-7
PepperAndEggSwitch(config-if-range)#switchport mode access
PepperAndEggSwitch(config-if-range)#switchport access vlan 2
PepperAndEggSwitch(config-if-range)#
PepperAndEggSwitch(config-if-range)#exit
PepperAndEggSwitch(config)#interface fastEthernet 0/2
PepperAndEggSwitch(config-if)#switchport mode trunk
PepperAndEggSwitch(config-if)#
PepperAndEggSwitch(config-if)#exit
PepperAndEggSwitch(config)#exit
PepperAndEggSwitch#
%SYS-5-CONFIG_I: Configured from console by console
When expanding an existing computer network or building a new one, one of the many
devices that can be used in the process is an Ethernet hub. A hub is a simple device that
connects multiple computers together and to the rest of the network, allowing
communication to occur between all connected devices. When there is no need for the
enhanced functions available on a router or the higher communications speed of a switch,
an Ethernet hub can be an efficient way to create or expand a network at a lower cost
when compared to a router or switch.
Step 1
Find the WAN or uplink port of the Ethernet hub. Typically, it is located on the rear of the
unit, and it is often separate from the LAN ports.
Step 2
Connect an Ethernet cable from the WAN port of the hub to either the Ethernet port of
the internet modem or, if expanding a network, to an empty LAN port on the existing
network’s router, switch or hub.
Step 3
Plug an Ethernet cable into one of the LAN ports on the Ethernet hub and connect the
other end of cable to the computer or device that will be added to the network. Repeat for
any other devices that will need to be on the network.
Step 4
Power up the Ethernet hub and the computers or other devices attached to it. On the front
of the hub will be a series of LEDs that correspond to each LAN and WAN port on the hub.
Every port that has a cable plugged into it should have one or more of the LEDs lit that
represent that port. If not, check the connections and swap out the Ethernet cable if
necessary.
Step 5
Configure the network settings on each connected computer. If you are expanding a
network and the network uses DCHP, or dynamic IP addressing, no configuration will be
necessary. On networks using static IP addressing or on a new network setup using the
Ethernet hub, each computer or device must be assigned a unique IP address. Local IP
addresses must use the allowed “private” address pools that will not interfere with
internet addresses. Acceptable addresses include 192.168.x.x, 172.16.x.x to 172.31.x.x, or
10.x.x.x. The “x” represents a number that is chosen by the user, from 0 to 254. All
computers on the network should share the first three numbers in the address, with the
final number representing the individual computer. In a network with three computers, for
example, the first could be 192.168.1.1, the second could be 192.168.1.2 and the third
could be 192.168.1.3, though the final number does not need to be sequential.
Step 6
Click the “Start” button in Windows, select “Control Panel" and double-click the icon labeled
“Network Connections.”
Step 7
Right-click the icon for the Ethernet adapter and select “Properties.” Click on the check box
marked “Internet Protocol (TCP/IP)” and press the “Properties” button.
Step 8
Select the radio button labeled “Use the following IP address.” Enter a unique IP address for
the computer and the applicable subnet mask. If a router is used on the network, enter the
router’s IP address as the default gateway. Press the “OK” button and reboot if necessary.
Step 9
Enable file and printer sharing from the “Properties” dialog for the Ethernet card if files will
be transferred between the networked computers.
Step 10
Click the “Start” button, select “Control Panel” and double-click on the “System” icon. Select
the “Computer Name” tab and click on the button labeled “Change” to set the computer’s
network name. In the “Computer Name” box, enter a unique name for the computer. In the
“Member of” section, choose the radio button marked “Workgroup” and enter the
workgroup of the network. If setting up a new network, this name can be change but all
computers on the network must share the same workgroup name.
Step 11
Verify that all computers can access the network and the Internet if connected.
Ideally, connect the power cord directly into the wall outlet instead of to a power strip.
DI
AL
-
UP
Ne
tw
or
k
Most computers don't come with dialup modems, so make sure you have one installed
before proceeding. Be sure the dialup modem is compatible with Windows 10.
1. Click on the network icon which is normally located at the bottom right of your screen.
6. Click Next.
7. Click Dial-up.
12. As the final screen states, “To connect to the Internet next time, left-click the
network icon in the taskbar and click the connection you just created.”
Click Close.
Q9. What are the Features of Firewall. Write Steps in providing network security and to
set Firewall Security in Windows.
A Cyber Security Firewall is a network security system which can either be a hardware or
software that protects the trusted network from unauthorised access from external
networks and external threats.
Minimizing the damage that a cyberattack can cause to a network requires threat
prevention. By identifying and blocking an attack before it crosses the network boundary, an
organization nullifies the threat it poses to the network. This is why a network firewall with
integrated threat prevention functionality – including anti-phishing, antimalware, anti-bot,
and integration with high-quality threat intelligence feeds – is an essential component of an
organization’s cybersecurity strategy.
Organizations are also composed of a number of individuals with different job roles and
responsibilities. An organization’s security policies should also be configurable based upon
the identity of the user. Employees within an organization should have access to different
systems and be able to use varying sets of applications. A firewall should support policy
creation and enforcement based upon user identity.
For this reason, an organization’s next-generation firewall should incorporate hybrid cloud
support. The firewall should be easily deployable and scalable in any major cloud
environment and enable an organization’s security team to manage all of their security
settings from a single console. According to Gartner,99% of cloud security failuresthrough
2025 will be the customer’s fault, a problem that the company’s firewall should help the
organization to avoid.
A firewall system analyzes network traffic based on pre-defined rules. It then filters the
traffic and prevents any such traffic coming from unreliable or suspicious sources. It only
allows incoming traffic that is configured to accept.
Typically, firewalls intercept network traffic at a computer's entry point, known as a port.
Firewalls perform this task by allowing or blocking specific data packets (units of
communication transferred over a digital network) based on predefined security rules.
Incoming traffic is allowed only through trustedIPaddresses, or sources.
Limitations of Firewall
The importance of using firewalls as a security system is obvious; however, firewalls have
some limitations:
o Firewalls cannot stop users from accessing malicious websites, making it vulnerable
to internal threats or attacks.
o Firewalls cannot protect against the transfer of virus-infected files or software.
o Firewalls cannot prevent misuse of passwords. oFirewalls cannot protect if security
rules are misconfigured. oFirewalls cannot protect against non-technical security
risks, such as social engineering. oFirewalls cannot stop or prevent attackers with
modems from dialing in to or out of the internal network. oFirewalls cannot secure
the system which is already infected.
Windows comes with a firewall named, coincidentally, Windows Firewall. It’s accessed from
the Control Panel. Follow these steps:
As far as you’re concerned, Windows Firewall has only two settings: on and off. To change
the setting, click the Turn Windows Firewall On or Off link on the left side of the Windows
Firewall window.
Once activated — and it should be activated — the Windows Firewall goes to work. When
unwanted access is detected, either to or from the Internet, you see a pop-up window
alerting you to the intrusion. At that point, you can choose to allow access by the named
program by clicking the Allow Access button. If you want to continue blocking the program,
just click Cancel.
Q10. Write Steps for installation of System Software; Application Software and Anti Virus.
The installation file will be saved to your computer in .exe format. Pronounced dot e-x-e,
this is the standard extension for installation files on Windows computers. You can follow
the steps below to install an application from an .exe file.
2. Locate and double-click the .exe file. (It will usually be in your Downloads
folder.)
3. A dialog box will appear. Follow the instructions to install the software.
4. The software will be installed. You can now open the application from the
Start menu (Windows 7) or the Start Screen (Windows 8).
You can follow the steps below to install an application from an .exe file.
1. If you purchased the antivirus program from a retail store, insert theCDorDVDinto the
computer's disc drive. The installation process should start automatically, with a
window opening to help guide you through the install process.
2. If youdownloadedthe antivirus program on the Internet, find the downloaded file on
your computer. If the downloaded file is a zip file,unzipthe file to extract and access the
installation files. Look for a file named setup.exe, install.exe, or something similar,
thendouble-clickthat file. The installation process should start, with a window opening
to help guide you through the install process.
a) In the installation process window, follow the steps provided to install the
antivirus program. The install process provides recommended options so the
antivirus program will function properly, which in most cases can be accepted as
is. The one exception is if the install process recommends to install any toolbars
for Internet browsers or other helpful programs for your computer. If prompted
to install other software with the antivirus program, uncheck all boxes or
decline the install of those extra programs. No additional programs should be
needed for the antivirus program to install and run successfully on your
computer.
b) When the install process is complete, close out of the install window.
The antivirus program is now installed and ready to use. While it may not be required, we
recommendrestartingyour computer so that any modified settings in the operating system
can take effect correctly.
Q11. What do you mean by Spooling Printers? Write the Steps for Spooling Printers.
The Print Spooler is software built into the Windows operating system that temporarily
stores print jobs in the computer's memory until the printer is ready to print them. In some
circumstances you may need to stop and/or restart the service. To access the Print Spooler
you must open the Local Services console.
STEP 1: Click the Windows "Start" button, right-click "Computer" and choose "Manage" from
the context menu.
STEP 2: Double-click "Services and Applications" and double-click "Services" to view all the
services.
STEP 3: Scroll down and double-click the "Print Spooler" service to open its Properties
window.
STEP 4: Select "Automatic" in the Startup Type drop-down menu and click the "Start" button
to enable printer spooling on your computer.
STEP 5: Click "OK" to close the Properties window, and close the Computer Management
window.
Note: Command Prompt is an application where you type commands for the operating
system to execute instantly.
Instead of using the command prompt, you can use the graphical interface of the operating
system. But, at times, the command prompt saves a lot of time by letting you avoid various
steps at once. Step 4 – Stopping Printer Spooler Service
In the command prompt, type the command “net stop spooler” and press the Enter key.
You will see a message on the command prompt “The print spooler service is stopping”.
After some time, you will see another message confirming “The print spooler service
stopped successfully”.
Step 5 – Delete The Pending Orders
Now that the spooler has stopped working, you have to ensure that when the spooler
service restarts, it does not print the previously stopped order and pending orders.
#include <stdio.h>
#include <string.h>
void extractIpAddress(unsigned char *sourceString,short *ipAddress)
{
unsigned short len=0;
unsigned char oct[4]={0},cnt=0,cnt1=0,i,buf[5];
len=strlen(sourceString);
for(i=0;i<len;i++)
{
if(sourceString[i]!='.'){
buf[cnt++] =sourceString[i];
}
if(sourceString[i]=='.' || i==len-1){
buf[cnt]='\0';
cnt=0;
oct[cnt1++]=atoi(buf);
}
}
ipAddress[0]=oct[0];
ipAddress[1]=oct[1];
ipAddress[2]=oct[2];
ipAddress[3]=oct[3];
}
int main()
{
unsigned char ip[20]={0};
short ipAddress[4];
extractIpAddress(ip,&ipAddress[0]);
return 0;
}
Output
Enter IP Address (xxx.xxx.xxx.xxx format): 145.160.017.001
Ans:
#include <bits/stdc++.h>
int n = input.length();
"vwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 ";
if (islower(input[i]))
hasLower = true;
if (isupper(input[i]))
hasUpper = true;
if (isdigit(input[i]))
hasDigit = true
if (special != string::npos)
specialChar = true;
// Strength of password
cout << "Strength of password:-";
else
// Driver code
int main()
printStrongNess(input);
return 0;
Output
Strength of password:-Strong
Q14. Write Steps to transfer files between Wireless Communication using Blue Tooth and
FTP.
This process is actually a bit easier but will drastically vary, depending on the operating
system you’re using. However, most platforms have developed a very user-friendly process
for sending files via Bluetooth. I’ll demonstrate usingBlueman, which should illustrate how
easy sharing files can be. Here’s the process:
As I mentioned, depending on your platform, the process will vary — but it shouldn’t be any
more difficult than what I outlined above. Sharing files between your Android device and
your desktop doesn’t have to be a challenge. If you happen to have a Bluetooth adapter on
your desktop, you can make this process even easier by taking advantage of the Android
built-in sharing system.
Share a photo, video, or other kind of file with a friend who has a phone, laptop, or tablet.
1. Make sure the other device you want to share with is paired with your PC, turned
on, and ready to receive files.Learn how to pair.
2. On your PC, select Start >Settings >Devices>Bluetooth & other devices.
3. In Bluetooth & other devices settings, select Send or receive files via Bluetooth.
4. In Bluetooth File Transfer, select Send files> choose the device you want to share to
>Next.
5. Select Browse> the file or files to share >Open>Next (which sends it) >Finish.
6. On the receiving device, have your friend accept the file. SeeReceive a file over
Bluetooth.
The procedure below will work with current versions of Internet Explorer and Firefox for
Windows.
To transfer files viaFTPusing your web browser in Windows:
1. From the File menu, choose Open Location....
2. In the "Location" field, type a URL like the following:
ftp://username@name-of-server
For example, if your username is dvader, and you want to reach your account on
deathstar.empire.gov, enter:
ftp://[email protected]
Note: Do not close the URL with /, or you will connect to the root directory rather than your home
a directory.
3.You will be prompted for your password. After you supply the password, you will see the contents
of your
home directory on the remote machine. To change directories, click the appropriate
yellow folder icon.
4. To download a file, drag the file from the browser window to the desktop. You can
also double-click the filename, and you will be prompted to either save or open the
file.
5. To upload a file, drag the file from your hard drive to the browser window.
Consequence of attack:
The malware attack was done on the critical communication systems between the various
payment gateways after which an amount estimated to be INR 78 crore was withdrawn
“physically” through 12,000 ATM transactions outside India, while another 2,800
transactions were made in different corners of the country, worth an estimated INR 2.5 crore.
It was observed that unusual repeated transactions were taking place through Visa and Rupay
cards used at various ATMs for nearly two hours. On August 13, INR 13.5 crore was
transferred by the hackers to the Hong Kong-based Hanseng bank, using the Society for
Worldwide Interbank Financial Telecommunication (SWIFT) facility. As per the payment
settlement system, Visa and Rupay had raised demands for payment for all of the fraudulent
transactions and as per the agreement the bank had to pay a total amount of INR 80.5 Cr to
them.Regarding the transaction of transfer of money (INR 13.92 Cr) to a Hong Kong based
bank.
Reasons of the attack:Investigations showed that the cyber-criminals had made enough and
extremely through background surveillance of the cosmos banking infrastructure first.. The
researchers concluded that the heist would be very visible from the bank audit report
generated by the system itself.Also a few days prior to the attack, the American FBI had
warned banks of a major hacking threat to ATMs worldwide and despite increased awareness
and spend, organizations have proven themselves largely unprepared for a more organized,
strategic and persistent threat.
Technical Loopholes:It has been stated that the bank may have failed to adequately invest in
its SOC (Security Operation Center), which should have analyzed the traffic coming in. An
analysis was made that the bank’s fraud detection mechanism was non- existent as there
should’ve been red alerts when so many overseas transactions were taking place at such a
short span of time.
However, in its statement the bank contended it had adequate IT security in place.
#include <stdio.h>
#include <string.h>
int main (){
char txt[] = "tutorialsPointisthebestplatformforprogrammers";
char pat[] = "a";
int M = strlen (pat);
int N = strlen (txt);
for (int i = 0; i <= N - M; i++){
int j;
for (j = 0; j < M; j++)
if (txt[i + j] != pat[j])
break;
if (j == M)
printf ("Pattern matches at index %d \n", i);
}
return 0;
}
17.Prepare a case study on Social Media Crime that occurred in Pune 2021.
The number of cybercrime complaints reported based on misuse of social networking sites doubled in
2021 compared to 2020. The overall number of complaints have seen an exponential increase since
2018. The city cybercrime cell received 19,023 total complaints in 2021 that belong to various
categories, such as monetary frauds, sending vulgar messages on phones, email hacking, stealing
online data and defaming people by posting morphed pictures in social media and many more.
According to Pune cybercrime police data, 14,950 such complaints were reported in 2020 and 7,795
in 2019.
The methods of defrauding people have become innovative, according to BhagyashreeNavatake,
deputy commissioner of police, cybercrime, and Economic offence wing of Pune police. “There were
innovative ways of defrauding people every 8-10 days. When Covid began, the number of cases of
calling up positive patients and duping them increased. This happened in addition to the casual
approach of people who click on links and share OTP. The use of e-commerce and various kinds of
software also increased. These factors contributed to the rise in cases,” said DCP Navatake.
Among social media-related cybercrime, the cases from popular platforms Facebook and Instagram
are the highest. The city police introduced a new section for its records for “sextortion” and
“friendship fraud”, on Facebook and Instagram, which consist of cases of using sexual images or
videos for extortion. The highest number of cases were of defamation and posts by making fake
profiles or making vulgar comments on posts or through messages. The number of cases doubled
from 791 in 2020, to 1,518 in 2021.
On other platforms including Twitter, the new section added for record was of posting vulgar
comments on Zoom meetings and uploading of videos on social media sites other than Facebook and
Instagram. The trend has seen a worrying rise among minor victims and adults equally. Children were
exposed to added screentime owing to the online schooling necessitated by the lockdown, said
officials.
18.Prepare a case study on Japanese Bank for Keylogger Scam
In the London case, where the criminals attempted to transfer $420 from a London branch of Japanese
bank, the technique applied was password cracking. Using Key loggers, the criminals were in a
position to get access to some of the key passwords to the bank system. The information that was
obtained from the key logger programs was used to access some of the most important and restricted
data areas, including access codes that were private the banking top managerial staff. This gave the
criminals directs access to the bank information that led to the attempted crime.
It is also possible that the criminals also used session hijacking through the internet to enable them to
get into important accounts of the bank. A combination of these two techniques must have led to
successful log in to the private accounts of the bank. These are some of the topmost methods that the
criminals always use in accessing private information from the banks. Recent crimes related to the
same have been witnesses in various regions of the world. It has still been realized that password
cracking is still the main method that is usually employed.
There are numerous measures that exist to control cybercrimes. One of these is the use of strong
passwords or user ID. This should be frequently reviewed and changed to limit the extent to which the
key logger programs can access the passwords. It may be able to detect the password, but in changing
this password again and again, successful hacking may be limited.
1. Organize a DDoS Attack Response Plan. Don’t be caught blindsided by DDoS attacks; have a
response plan ready in case of a security breach so your organization can respond as promptly as
possible. Your plan should document how to maintain business operations if a DDoS attack is
successful, any technical competencies and expertise that will be necessary, and a systems checklist to
ensure that your assets have advanced threat detection.
Equip your network, applications, and infrastructure with multi-level protection strategies. This may
include prevention management systems that combine firewalls, VPN, anti-spam, content filtering and
other security layers to monitor activities and identity traffic inconsistencies that may be symptoms of
DDoS attacks.
Identify weakness in your networks before a malicious user does. A vulnerability assessment involves
identifying security exposures so you can patch up your infrastructure to be better prepared for a
DDoS attack, or for any cybersecurity risks in general.
If you can identify the symptoms of a DDoS attack as early as possible, you can act and hopefully
mitigate damage. Spotty connectivity, slow performance, and intermittent web crashes are all signs
that your business may be coming under attack from a DDoS criminal. Educate your team on signs of
DDoS attacks so everyone can be alert for warning signs.
5. Adopt Cloud-Based Service Providers.
Cloud providers who offer high levels of cybersecurity, including firewalls and threat monitoring
software, can help protect your assets and network from DDoS criminals. The cloud also has greater
bandwidth than most private networks, so it is likely to fail if under the pressure of increased DDoS
attacks.
20.Write the steps to demonstrate intrusion detection system (ids) using the tool SNORT
Benefits of IDS
● Detects malicious activity: IDS can detect any suspicious activities and
alert the system administrator before any significant damage is done.
● Improves network performance: IDS can identify any performance
issues on the network, which can be addressed to improve network
performance.
● Compliance requirements: IDS can help in meeting compliance
requirements by monitoring network activity and generating reports.
● Provides insights: IDS generates valuable insights into network traffic,
which can be used to identify any weaknesses and improve network
security.
Detection Method of IDS
1. Signature-based Method: Signature-based IDS detects the attacks on the
basis of the specific patterns such as the number of bytes or a number of
1s or the number of 0s in the network traffic. It also detects on the basis of
the already known malicious instruction sequence that is used by the
malware. The detected patterns in the IDS are known as signatures.
Signature-based IDS can easily detect the attacks whose pattern
(signature) already exists in the system but it is quite difficult to detect new
malware attacks as their pattern (signature) is not known.
2. Anomaly-based Method: Anomaly-based IDS was introduced to detect
unknown malware attacks as new malware is developed rapidly. In
anomaly-based IDS there is the use of machine learning to create a trustful
activity model and anything coming is compared with that model and it is
declared suspicious if it is not found in the model. The machine learning-
based method has a better-generalized property in comparison to
signature-based IDS as these models can be trained according to the
applications and hardware configurations.
Comparison of IDS with Firewalls
IDS and firewall both are related to network security but an IDS differs from a
firewall as a firewall looks outwardly for intrusions in order to stop them from
happening. Firewalls restrict access between networks to prevent intrusion
and if an attack is from inside the network it doesn’t signal. An IDS describes a
suspected intrusion once it has happened and then signals an alarm.
Conclusion:
Intrusion Detection System (IDS) is a powerful tool that can help
businesses in detecting and prevent unauthorized access to their network.
By analyzing network traffic patterns, IDS can identify any suspicious
activities and alert the system administrator. IDS can be a valuable addition
to any organization’s security infrastructure, providing insights and
improving network performance.
Q21. What is Malware? Write Steps to remove the malware from your PC.
Malware can infect networks and devices and is designed to harm those devices, networks
and/or their users in some way. Depending on the type of malware and its goal, this harm
may present itself differently to the user or endpoint. In some cases, the effect malware has
is relatively mild and benign, and in others, it can be disastrous.
No matter the method, all types of malware are designed to exploit devices at the expense
of the user and to the benefit of the hacker -- the person who has designed and/or
deployed the malware.
Malware authors use a variety of physical and virtual means to spread malware that
infects devices and networks. For example, malicious programs can be delivered to a
system with a USB drive, through popular collaboration tools and by drive-by downloads,
which automatically download malicious programs to systems without the user's approval
or knowledge.
Different types of malware have unique traits and characteristics. Types of malware include
the following:
• Avirusis the most common type of malware that can execute itself and spread by
infecting other programs or files.
• Awormcan self-replicate without a host program and typically spreads without any
interaction from the malware authors.
• ATrojan horseis designed to appear as a legitimate software program to gain access to
a system. Once activated following installation, Trojans can execute their malicious
functions.
• Spywarecollects information and data on the device and user, as well as observes the
user's activity without their knowledge.
• Ransomwareinfects a user's system and encrypts its data. Cybercriminals thendemand
a ransom paymentfrom the victim in exchange for decrypting the system's data.
• Arootkitobtains administrator-level access to the victim's system. Once installed, the
program gives threat actors root or privileged access to the system.
• Abackdoorvirus or remote access Trojan (RAT) secretly creates a backdoor into an
infected computer system that enables threat actors to remotely access it without
alerting the user or the system's security programs.
• Adwaretracks a user's browser and download history with the intent to display pop-up
or banner advertisements that lure the user into making a purchase. For example, an
advertiser might use cookies to track the webpages a user visits to better target
advertising.
• Keyloggers, also called system monitors, track nearly everything a user does on their
computer. This includes emails, opened webpages, programs and keystrokes.
As mentioned, many security software products are designed to detect and prevent
malware, as well as remove it from infected systems.
Disconnecting from the internet will prevent more of your data from being sent to a
malware server or the malware from spreading further.
If malware is set to load automatically, this will prevent the malware from loading, making
it easier to remove. To enter safe mode:
To avoid sharing your personally identifiable information, do not log into sensitive accounts
while your device is infected.
If you know that you’ve installed a suspicious update or application, close the application if
it’s running. Your activity monitor shows the processes that are running on your computer,
so you can see how they affect your computer’s activity and performance.
In Type to search type → Resource Monitor → Find End Task → Right Click → End Process
Step 4: Run a malware scanner
Luckily, malware scanners can remove many standard infections. But remember that if you
already have an antivirus program active on your computer, you should use a different
scanner for this malware check since your current antivirus software may not detect the
malware initially.
Malware is likely to modify your web browser’s homepage to re-infect your PC. Check your
homepage and connection settings using the steps below for common browsers.
To verify your homepage on Chrome:
• In the top right corner of your Chrome browser,
click More → Settings.
Select the dropdown menu in the “Search engine” section.
• Verify your default homepage.
To verify your homepage on Internet Explorer:
After you’ve verified your homepage setting, it’s imperative to clear your browser’s cache.
Follow these steps below to learn how to clear your cache for Chrome and Internet
Explorer. To clear your cache on Chrome:
History → Clear Browsing Data → Time Range → All Time → Clear Data. To clear your cache
on Internet Explorer:
Q22. What are the various types of Vulnerabilities for hacking the Web Applications.
Most Common Website Security Vulnerabilities
1. SQL INJECTIONS
Cross-site scripting (XSS) targets an application's users by injecting code, usually a client-side
script such as JavaScript, into a web application's output. The concept of XSS is to
manipulate client-side scripts of a web application to execute in the manner desired by the
attacker. XSS allows attackers to execute scripts in the victim's browser which can hijack
user sessions, deface websites or redirect the user to malicious sites.
Broken authentication and session management encompass several security issues, all of
them having to do with maintaining the identity of a user. If authentication credentials and
session identifiers are not protected at all times, an attacker can hijack an active session
and assume the identity of a user.
5. SECURITY MISCONFIGURATION
It is crucial to keep all platforms or scripts you've installed up-to-date. Hackers aggressively
target security flaws in popular web software, and the programs need to be updated to
patch security holes. It is important to maintain and update every software product you
use.
UseSSLencryptionon your login pages. SSL allows sensitive information such as credit card
numbers, social security numbers, and login credentials to be transmitted securely.
Information entered on a page is encrypted so that it's meaningless to any third party who
might intercept it. This helps to prevent hackers from accessing your login credentials or
other private data.
Every database, application, or plugin on your website is another possible point of entry for
hackers. You should delete any files, databases, or applications from your website that are
no longer in use. It is also important to keep your file structure organized to keep track of
changes and make it easier to delete old files.
Back up your site regularly. You should maintain backups of all of your website files in case
your site becomes inaccessible or your data is lost. Your web host provider should provide
backups of their own servers, but you should still backup your files regularly. Some content
management programs have plugins or extensions that can automatically back up your site,
and you should also be able to back up databases and content manually.
Developing a relationship with a firm that provides security services can be a lifesaver when
it comes to protecting your website. While the small things can be taken care of on your
own, there are many security measures that should be handled by an expert. Companies
providing security services can regularly scan your website for vulnerabilities, perform full
website security audits, monitor for malicious activity, and be on hand whenever repair is
needed. You and your team must always be vigilant in protecting your website, and these
practical tips represent only the most basic methods. Never stop seeking security
protections for your website. Don't let the bad guys win.
Q23. Write Steps for Sharing Files and Printer remotely between two systems.
Our remote file access feature allows administrators to quickly connect with any computer
in their domain/workgroup and access files remotely. The remote file transfer process
offers convenience and efficiency to administrators as they can work from anywhere.
There are two ways to share your printer: using Settings or Control Panel.
1. Select the Start button, then select Settings>Devices >Printers & scanners.
2. Choose the printer you want to share, then select Manage.
3. Select Printer Properties, then choose the Sharing tab.
4. On the Sharing tab, select Share this printer.
5. If you want, edit the share name of the printer. You'll use this name to connect to
the printer from a secondary PC.
1. In the search box on the taskbar, type control panel and then select Control Panel.
2. Under Hardware and Sound, select View devices and printers.
3. Select and hold (or right-click) the printer you want to share, select Printer
properties, and then choose the Sharing tab.
4. On the Sharing tab, select Share this printer.
5. If you want, edit the share name of the printer. You'll use this name to connect to he
printer from a secondary PC..
Q24. List out the Various Mobile Security Apps. Write the Steps to install and use one of
the Mobile Security App.
Mobile application security focuses on the software security posture of mobile apps on
various platforms like Android, iOS, and Windows Phone. This covers applications that run
both on mobile phones as well as tablets.
Mobile app security has become equally important in today's world. A breach in mobile
security can not only give hackers access to the user's personal life in real-time but also
disclose data like their current location, banking information, personal information, and
much more.
Google Play Protect checks your apps and devices for harmful behavior.
• It runs a safety check on apps from the Google Play Store before you download
them.
• It checks your device for potentially harmful apps from other sources. These harmful
apps are sometimes called malware.
• It warns you about potentially harmful apps.
• It may deactivate or remove harmful apps from your device.
• It warns you about detected apps that violate ourUnwanted Software Policyby
hiding or misrepresenting important information.
• It sends you privacy alerts about apps that can get user permissions to access your
personal information, violating ourDeveloper Policy.
• It may reset app permissions to protect your privacy on certain Android versions.
Important: Google Play Protect is on by default, but you can turn it off. For security, we
recommend that you always keep Google Play Protect on.
25.Write the algorithm for encoding and decoding the Hash-Based Message
Authentication Code(HMAC)
When you receive the input string, you have to make sure the size is 64 bits
short of a multiple of 512. When it comes to padding the bits, you must add one(1)
first, followed by zeroes to round out the extra characters.
Padding Length
You need to add a few more characters to make your final string a multiple of
512. To do so, take the length of the initial input and express it in the form of 64 bits.
On combining the two, the final string is ready to be hashed.
Initialize MD Buffer
The entire string is converted into multiple blocks of 512 bits each. You also
need to initialize four different buffers, namely A, B, C, and D. These buffers are 32
bits each and are initialized as follows:
A = 01 23 45 67
B = 89 ab cd ef
C = fe dc ba 98
D = 76 54 32 10
Each 512-bit block gets broken down further into 16 sub-blocks of 32 bits
each. There are four rounds of operations, with each round utilizing all the sub-
blocks, the buffers, and a constant array value.
Police learnt Nigerian handlers operating from India were tasked to open bank accounts through
locals in banks. Phishing mails were sent by an unidentified hacker to 200 staff of Mahesh bank
and two of them clicked on links in mails, allowing remote access Trojan malware to be
installed.
This means that if you have a Facebook account, it is extremely likely the phone number
used for the account was leaked.
Facebook claims hackers obtained user data through data scraping — a process used by
people to import data from a website onto a local file that is saved in a computer. The social
networking giant also noted in a blog post that “the specific issue that allowed them
[hackers] to scrape this data in 2019 no longer exists.”
“A lot of companies like Facebook, Google and others provide their APIs to developers for
several reasons. Hacker groups essentially use them to scrape data from these sites,” said
Rajshekhar Rajaharia, a Rajasthan-based entrepreneur and cyber security researcher, in an
email to The Hindu.
“They can procure the name and email of a particular user from one website through their
API, A second website’s API might provide them with their phone number and address, a
third might open the doors to more sensitive information on the same user. Hackers are
essentially combining these details and creating a complete data set which is then being sold
online.”
Uniqueness of this leak, and similarity with others
The latest instance stands out for the sheer number of accounts compromised. According to
a report published by Business Insider , personal information of over half a billion
Facebook users in 106 countries was leaked online. This includes over 32 million records on
users in the U.S., 11.5 million in the U.K., and 6 million in India.
Earlier, data of 500 million LinkedIn users were being sold online by an unknown hacker
who had dumped two million users’ data as sample. Separately, online stock trading
company Upstox’s data was stolen due to compromised Amazon Web Service (AWS) keys.
This hack includes users’ Aadhaar and PAN credentials, passport soft copy, bank account
numbers, and photos of signatures, Rajaharia noted.
“In the case of LinkedIn, it was asserted that data was scraped, in other words, someone
violated the terms of service to cull out data from the public profile, combined with data
from other sites,” Raj Samani, Chief Scientist at cybersecurity firm McAfee told The Hindu .
The information leaked is in many ways similar to Facebook’s leak, but it contains other
professional information that might add another layer of sensitivity.
How can one check whether their data has been compromised?
Internet users seeking to know whether their data has been leaked or compromised, can
visit HaveiBeenPawned.com . All they have to do is to key in their email id and check.
1. Stay legal. Obtain proper approval before accessing and performing a security
assessment.
2. Define the scope. Determine the scope of the assessment so that the ethical
hacker’s work remains legal and within the organization’s approved
boundaries.
3. Report vulnerabilities. Notify the organization of all vulnerabilities discovered
during the assessment. Provide remediation advice for resolving these
vulnerabilities.
4. Respect data sensitivity. Depending on the data sensitivity, ethical hackers
may have to agree to a non-disclosure agreement, in addition to other terms
and conditions required by the assessed organization.
#include <sys/socket.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <netdb.h>
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <string.h>
#include <errno.h>
#include <arpa/inet.h>
#include <string.h>
printf("%s\n",ptr);
printf("status=%d\n",status);
printf("End Response ..\n");
return (bytes_received>0)?status:0;
if(
(ptr[-3]=='\r') && (ptr[-2]=='\n' ) &&
(ptr[-1]=='\r') && (*ptr=='\n' )
) break;
ptr++;
}
*ptr=0;
ptr=buff+4;
//printf("%s",ptr);
if(bytes_received){
ptr=strstr(ptr,"Content-Length:");
if(ptr){
sscanf(ptr,"%*s %d",&bytes_received);
}else
bytes_received=-1; //unknown size
printf("Content-Length: %d\n",bytes_received);
}
printf("End HEADER ..\n");
return bytes_received ;
int main(void){
he = gethostbyname(domain);
if (he == NULL){
herror("gethostbyname");
exit(1);
}
//fp=fopen("received_file","wb");
printf("Recieving data...\n\n");
int contentlengh;
int bytes=0;
FILE* fd=fopen("test.png","wb");
printf("Saving data...\n\n");
fwrite(recv_data,1,bytes_received,fd);
bytes+=bytes_received;
printf("Bytes recieved: %d from %d\n",bytes,contentlengh);
if(bytes==contentlengh)
break;
}
fclose(fd);
}
close(sock);
printf("\n\nDone.\n\n");
return 0;
}
Step1: open power point application window Start button ->all programs ->Microsoft office ->
Microsoft PowerPoint.
Step2: Take new slide: go to Home tab -> slides ->select new slide
Step5: select a slide and write the content regarding the topics then apply transitions
Step6: Go to animation tab -> transition to this slide group ->select any one transition.
Step7: repeat step 4 and 5 until to apply custom animations to all slides
Step 8: save the file 33. Write an algorithm and Program for encrypting a plain text
31.Write the steps to detect the number of devices connected to wifi and block unauthorized
devices
Prevention:
● Scan your home network at regular intervals to remove the devices which
you see as fit.
● Update your Wi-Fi password with a stronger one and try to change it after a
period of time.
● Update your default Wi-Fi SSID (Service Set Identifier).
● Disable WPS (Wi-Fi Protected Setup) through your router’s admin panel.
● Enable New Device Approval.
Conclusion:
Most of the time, finding some unknown device on your network isn’t going to
cause any problems for you. But it is not proper for someone to use the
service you are paying for, even when that device could be someone you’ve
given access to before, and you don’t recognize their name. Also, there are
chances for malicious persons to steal your data, so one should always be
careful about taking all the above-mentioned precautions.
32.Prepare a case study on Crypto currency Cyber attack. (Ex: Grim Finance)
Key Findings
In addition to the inbound stolen funds bridged from Fantom mainnet, an unknown
individual sent a message to the attacker via BSC to alert that wallets associated
with the attacker were blacklisted.
33.Write an algorithm and Program for encrypting a plain text and decrypting a cipher text using
Caesar Cipher.
#include<stdio.h>
int main()
{
char message[100], ch;
int i, key;
printf("Enter a message to encrypt: ");
gets(message);
printf("Enter key: ");
scanf("%d", &key);
for(i = 0; message[i] != '\0'; ++i){
ch = message[i];
if(ch >= 'a' && ch <= 'z'){
ch = ch + key;
if(ch > 'z'){
ch = ch - 'z' + 'a' - 1;
}
message[i] = ch;
}
else if(ch >= 'A' && ch <= 'Z'){
ch = ch + key;
if(ch > 'Z'){
ch = ch - 'Z' + 'A' - 1;
}
message[i] = ch;
}
}
printf("Encrypted message: %s", message);
return 0;
}
Output
#Encryption
#Decryption
34.Write an algorithm and Program to implement Data Encryption Standard (DES) for
encryption and decryption
#include <stdio.h>
#include <stdlib.h>
#include <ctype.h>
#include <math.h>
#include <time.h>
int IP[] =
{
58, 50, 42, 34, 26, 18, 10, 2,
60, 52, 44, 36, 28, 20, 12, 4,
62, 54, 46, 38, 30, 22, 14, 6,
64, 56, 48, 40, 32, 24, 16, 8,
57, 49, 41, 33, 25, 17, 9, 1,
59, 51, 43, 35, 27, 19, 11, 3,
61, 53, 45, 37, 29, 21, 13, 5,
63, 55, 47, 39, 31, 23, 15, 7
};
int E[] =
{
32, 1, 2, 3, 4, 5,
4, 5, 6, 7, 8, 9,
8, 9, 10, 11, 12, 13,
12, 13, 14, 15, 16, 17,
16, 17, 18, 19, 20, 21,
20, 21, 22, 23, 24, 25,
24, 25, 26, 27, 28, 29,
28, 29, 30, 31, 32, 1
};
int P[] =
{
16, 7, 20, 21,
29, 12, 28, 17,
1, 15, 23, 26,
5, 18, 31, 10,
2, 8, 24, 14,
32, 27, 3, 9,
19, 13, 30, 6,
22, 11, 4, 25
};
int FP[] =
{
40, 8, 48, 16, 56, 24, 64, 32,
39, 7, 47, 15, 55, 23, 63, 31,
38, 6, 46, 14, 54, 22, 62, 30,
37, 5, 45, 13, 53, 21, 61, 29,
36, 4, 44, 12, 52, 20, 60, 28,
35, 3, 43, 11, 51, 19, 59, 27,
34, 2, 42, 10, 50, 18, 58, 26,
33, 1, 41, 9, 49, 17, 57, 25
};
int S1[4][16] =
{
14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7,
0, 15, 7, 4, 14, 2, 13, 1, 10, 6, 12, 11, 9, 5, 3, 8,
4, 1, 14, 8, 13, 6, 2, 11, 15, 12, 9, 7, 3, 10, 5, 0,
15, 12, 8, 2, 4, 9, 1, 7, 5, 11, 3, 14, 10, 0, 6, 13
};
int S2[4][16] =
{
15, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5, 10,
3, 13, 4, 7, 15, 2, 8, 14, 12, 0, 1, 10, 6, 9, 11, 5,
0, 14, 7, 11, 10, 4, 13, 1, 5, 8, 12, 6, 9, 3, 2, 15,
13, 8, 10, 1, 3, 15, 4, 2, 11, 6, 7, 12, 0, 5, 14, 9
};
int S3[4][16] =
{
10, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8,
13, 7, 0, 9, 3, 4, 6, 10, 2, 8, 5, 14, 12, 11, 15, 1,
13, 6, 4, 9, 8, 15, 3, 0, 11, 1, 2, 12, 5, 10, 14, 7,
1, 10, 13, 0, 6, 9, 8, 7, 4, 15, 14, 3, 11, 5, 2, 12
};
int S4[4][16] =
{
7, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15,
13, 8, 11, 5, 6, 15, 0, 3, 4, 7, 2, 12, 1, 10, 14, 9,
10, 6, 9, 0, 12, 11, 7, 13, 15, 1, 3, 14, 5, 2, 8, 4,
3, 15, 0, 6, 10, 1, 13, 8, 9, 4, 5, 11, 12, 7, 2, 14
};
int S5[4][16] =
{
2, 12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9,
14, 11, 2, 12, 4, 7, 13, 1, 5, 0, 15, 10, 3, 9, 8, 6,
4, 2, 1, 11, 10, 13, 7, 8, 15, 9, 12, 5, 6, 3, 0, 14,
11, 8, 12, 7, 1, 14, 2, 13, 6, 15, 0, 9, 10, 4, 5, 3
};
int S6[4][16] =
{
12, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11,
10, 15, 4, 2, 7, 12, 9, 5, 6, 1, 13, 14, 0, 11, 3, 8,
9, 14, 15, 5, 2, 8, 12, 3, 7, 0, 4, 10, 1, 13, 11, 6,
4, 3, 2, 12, 9, 5, 15, 10, 11, 14, 1, 7, 6, 0, 8, 13
};
int S7[4][16]=
{
4, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1,
13, 0, 11, 7, 4, 9, 1, 10, 14, 3, 5, 12, 2, 15, 8, 6,
1, 4, 11, 13, 12, 3, 7, 14, 10, 15, 6, 8, 0, 5, 9, 2,
6, 11, 13, 8, 1, 4, 10, 7, 9, 5, 0, 15, 14, 2, 3, 12
};
int S8[4][16]=
{
13, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7,
1, 15, 13, 8, 10, 3, 7, 4, 12, 5, 6, 11, 0, 14, 9, 2,
7, 11, 4, 1, 9, 12, 14, 2, 0, 6, 10, 13, 15, 3, 5, 8,
2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11
};
int PC1[] =
{
57, 49, 41, 33, 25, 17, 9,
1, 58, 50, 42, 34, 26, 18,
10, 2, 59, 51, 43, 35, 27,
19, 11, 3, 60, 52, 44, 36,
63, 55, 47, 39, 31, 23, 15,
7, 62, 54, 46, 38, 30, 22,
14, 6, 61, 53, 45, 37, 29,
21, 13, 5, 28, 20, 12, 4
};
int PC2[] =
{
14, 17, 11, 24, 1, 5,
3, 28, 15, 6, 21, 10,
23, 19, 12, 4, 26, 8,
16, 7, 27, 20, 13, 2,
41, 52, 31, 37, 47, 55,
30, 40, 51, 45, 33, 48,
44, 49, 39, 56, 34, 53,
46, 42, 50, 36, 29, 32
};
int SHIFTS[] = { 1, 1, 2, 2, 2, 2, 2, 2, 1, 2, 2, 2, 2, 2, 2, 1 };
FILE* out;
int LEFT[17][32], RIGHT[17][32];
int IPtext[64];
int EXPtext[48];
int XORtext[48];
int X[8][6];
int X2[32];
int R[32];
int key56bit[56];
int key48bit[17][48];
int CIPHER[64];
int ENCRYPTED[64];
int F1(int i)
{
int r, c, b[6];
r = b[0] * 2 + b[5];
c = 8 * b[1] + 4 * b[2] + 2 * b[3] + b[4];
if (i == 0) {
return S1[r][c];
}
else if (i == 1) {
return S2[r][c];
}
else if (i == 2) {
return S3[r][c];
}
else if (i == 3) {
return S4[r][c];
}
else if (i == 4) {
return S5[r][c];
}
else if (i == 5) {
return S6[r][c];
}
else if (i == 6) {
return S7[r][c];
}
else if (i == 7) {
return S8[r][c];
}
}
if (i % 32 == 0) {
i = 0;
}
i = i + 4;
}
int value;
for (int i = 0; i < 8; i++)
{
value = F1(i);
ToBits(value);
}
}
SBox(XORtext);
void convertToBinary(int n)
{
int k, m;
for (int i = 7; i >= 0; i--)
{
m = 1 << i;
k = n & m;
if (k == 0) {
fprintf(out, "0");
}
else {
fprintf(out, "1");
}
}
}
while (i)
{
ch = fgetc(inp);
if (ch == -1) {
break;
}
i--;
convertToBinary(ch);
}
fclose(out);
fclose(inp);
}
fclose(out);
}
int bittochar()
{
out = fopen("result.txt", "ab+");
for (int i = 0; i < 64; i = i + 8) {
convertToBits(&ENCRYPTED[i]);
}
fclose(out);
}
k = 0;
for (int i = 28 – shift; i < 28; i++) {
C[x][i] = backup[x – 1][k++];
}
k = 0;
for (int i = 28 – shift; i < 28; i++) {
D[x][i] = backup[x – 1][k++];
}
}
while (!feof(in))
{
ch = getc(in);
plain[++i] = ch – 48;
}
fclose(in);
}
while (!feof(in))
{
ch = getc(in);
plain[++i] = ch – 48;
}
fclose(in);
}
void create16Keys()
{
FILE* pt = fopen("key.txt", "rb");
unsigned int key[64];
int i = 0, ch;
while (!feof(pt))
{
ch = getc(pt);
key[i++] = ch – 48;
}
key64to48(key);
fclose(pt);
}
return size;
}
int main()
{
// destroy contents of these files (from previous runs, if any)
out = fopen("result.txt", "wb+");
fclose(out);
create16Keys();
encrypt(n);
decrypt(n);
return 0;
}
35.Write RSA algorithm and Program to implement RSA Standard for encryption and decryption
// application
#include <bits/stdc++.h>
int temp;
while (1) {
temp = a % h;
if (temp == 0)
return h;
a = h;
h = temp;
double p = 3;
double q = 7;
double n = p * q;
double e = 2;
if (gcd(e, phi) == 1)
break;
else
e++;
}
// Private key (d stands for decrypt)
// d*e = 1 + k * totient
double d = (1 + (k * phi)) / e;
// Message to be encrypted
// Encryption c = (msg ^ e) % n
c = fmod(c, n);
// Decryption m = (c ^ d) % n
m = fmod(m, n);
printf("\nOriginal Message Sent = %lf", m);
return 0;
Output
Message data = 12.000000
Encrypted data = 3.000000
Original Message Sent = 12.000000
Email is the dream delivery platform for any and all types of cyberattacks; it provides a mechanism
capable of placing almost any kind of threat in front of almost any target.
Attackers use email to send malicious software attacks to an end user. Even when filters are able to
find potentially unwanted programs, attackers can still fall back to time-tested social engineering
tactics to convince victims to take actions against their own interests.
For decades, email has been the predominant end-user network application, so it should be no surprise
that attackers have focused their attention on exploiting email security threats. While the attack
techniques have become much more sophisticated over the years, security teams have long understood
the fundamentals of email security threats.
While the forms and intentions of email security threats have morphed many times, from sowing
chaos and denial of service via spam campaigns to today's dominant threats of ransomware and email
fraud, the email security threats themselves still generally fall into three categories:
Malware delivery
Phishing
Domain spoofing
Malware delivery
Ever since email applications began to include attachments, file attachments have been used to deliver
malware. Once email applications began to support executable content using the same types of
content that are offered on the web, attackers quickly learned to subvert that content with malicious
code.
Phishing
Phishing, in all its forms, is the practice of using email or other types of messaging applications to
carry out social engineering campaigns in an effort to convince the victim to perform some action.
Ordinary phishing campaigns spread generic phishing emails to a broad spectrum of potential targets
in order to harvest user credentials or infect users' systems with ransomware by prompting them to
click on malicious links.
Domain spoofing
Spoofing domains is a common tactic attackers use against email users. The domain being spoofed
may be in the headers of a message to try to fool the recipient into believing that the email originated
from a known domain. For example, an attacker may send a phishing message that appears to have
originated from the recipient's employer, bank or other trusted source.
37.What is SQL Injection? Write steps for SQL Injection attack on Insert, Update and Delete.
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that
an application makes to its database. It generally allows an attacker to view data that they are not
normally able to retrieve. This might include data belonging to other users, or any other data that the
application itself is able to access. In many cases, an attacker can modify or delete this data, causing
persistent changes to the application's content or behavior.
Retrieving hidden data, where you can modify an SQL query to return additional results.
Subverting application logic, where you can change a query to interfere with the application's logic.
UNION attacks, where you can retrieve data from different database tables.
Examining the database, where you can extract information about the version and structure of the
database.
Blind SQL injection, where the results of a query you control are not returned in the application's
responses.
#include <stdio.h>
// Function to compute `a^m mod n`
int compute(int a, int m, int n)
{
int r;
int y = 1;
while (m > 0)
{
r = m % 2;
// fast exponention
if (r == 1) {
y = (y*a) % n;
}
a = a*a % n;
m = m / 2;
}
return y;
}
int a, b; // `a` – Alice's secret key, `b` – Bob's secret key.
int A, B; // `A` – Alice's public key, `B` – Bob's public key
// choose a secret integer for Alice's private key (only known to Alice)
a = 6; // or, use `rand()`
// choose a secret integer for Bob's private key (only known to Bob)
b = 15; // or, use `rand()`
// Alice and Bob Exchange their public key `A` and `B` with each other
// Find secret key
int keyA = compute(B, a, p);
int keyB = compute(A, b, p);
return 0;
}
// application
#include<stdio.h>
#include<math.h>
int temp;
while (1)
temp = a%h;
if (temp == 0)
return h;
a = h;
h = temp;
}
// Code to demonstrate RSA algorithm
int main()
double p = 3;
double q = 7;
double n = p*q;
double e = 2;
if (gcd(e, phi)==1)
break;
else
e++;
double d = (1 + (k*phi))/e;
// Message to be encrypted
// Encryption c = (msg ^ e) % n
c = fmod(c, n);
// Decryption m = (c ^ d) % n
m = fmod(m, n);
return 0;
#include <stdio.h>
#include <conio.h>
#include <stdlib.h>
int main()
scanf("%d", &n);
printf("Enter the maximum value of random number\n");
scanf("%d", &max);
randomize();
num = random(max);
printf("%d\n",num);
getch();
return 0;
●International Agreements
●EU Legal Framework
●Bilateral Agreements
● National law
●Internal regulation
3 International Activities / UN
General Assembly Resolutions on:
● Developments in the Field of
Information and
Telecommunications in the Context
of International Security
● Combating the Criminal Misuse of
Information Technology
● Creation of a Global Culture of
Cybersecurity
● Creation of a Global Culture of
Cybersecurity and the Protection of
Critical Information Infrastructures
5 C3 : Substantial criminal law
● Article 2 – Illegal access
● Article 3 – Illegal interception
● Article 4 – Data interference
● Article 5 – System interference
● Article 6 – Misuse of devices
● Article 7 – Computer-related forgery
● Article 8 – Computer-related fraud
● Article 9 – Offences related to child pornography
● Article 10 – Offences related to infringements of
copyright and related right
evidence is known as cyber forensics. Evidence can be found on the hard drive or in deleted files.
Cybersecurityaims to reduce the risk ofcyberattacks and protect against unauthorized exploitation
of
systems, networks, and technologies. While digital forensicsfocuses on the recovery and
investigation of
As everything becomes digitalized, the scope of cyber forensics expands. It assists us in combating
hostile actions by identifying underlying perpetrators. The evidence gathered during inquiries aids
Obtaining a digital copy of the under inspection system: This method entails producing a copy
of the system’s data to avoid harm from being done to the actual system, which might lead to
file confusion with the files already present on the computer. Cloning a hard disc entails
replicating the hard drive’s files and folders. The duplicate is present on another disc by copying
Authenticating and confirming the replica: After copying the files, experts verify that the copied
data is consistent and exactly as it exists in the real system.
Determining that the copied data is forensically acceptable: It is possible to change the format
of the data while duplicating it from a device, resulting in discrepancies in the operating systems
of the investigators and the one from which the data was copied. To avoid this, detectives
ensure that the structure stays constant and that the data is forensically acceptable and is
written on the hard disk drive in a format that is adequately used in the computer.
Recovering deleted files: Criminals think of innovative ways of deleting the scene and often
remove
some data that could indicate their misconduct; it is the work of the investigators to recover and
for debugging, regularly updating the ISS, and offering protection systems in real-time. To
is necessary.
Analytical ability: A major part of being a cyber forensics specialist is the capability to analyze
Strong communication skills: A crime scene investigator must be able, as part of a case, to
8. NERC
The North American Electric Reliability Corporation (NERC) addresses
patching in NERC CIP Requirement 2.It requires Bulk Power System
(BPS) Operators/Owners to identify the source or sources utilized to
provide Entiter Security related patches for Cyber Assets utilized in
the operation of the Registered Entities are required to check for
new patches once every thirty five calendar days. Upon identification
of a new patch, entities are required to evaluate applicability of a
patch and then complete mitigation or installation activities within
35 calendar days of completion of assessment of applicability The
bulk electric system standards also provide network security
administration while still supporting best-practice industry processes.
9. Security controls
Security controls are safeguards or countermeasures to avoid,
detect, counteract, or minimize security risks to physical property,
information, computer systems, or other assets.
Before heading to the different types of cyber attacks, we will first walk you through a
cyber attack. When there is an unauthorized system/network access by a third party,
we term it as a cyber attack. The person who carries out a cyberattack is termed as
a hacker/attacker.
Slides:
1. Malware Attack
This is one of the most common types of cyberattacks. “Malware” refers to malicious
software viruses including worms, spyware, ransomware, adware, and trojans.
The trojan virus disguises itself as legitimate software. Ransomware blocks access to
the network's key components, whereas Spyware is software that steals all your
confidential data without your knowledge. Adware is software that displays
advertising content such as banners on a user's screen.
2. Phishing Attack
Phishing attacks are one of the most prominent widespread types of cyberattacks. It
is a type of social engineering attack wherein an attacker impersonates to be a
trusted contact and sends the victim fake mails.
Unaware of this, the victim opens the mail and clicks on the malicious link or opens
the mail's attachment. By doing so, attackers gain access to confidential information
and account credentials. They can also install malware through a phishing attack.
3. Password Attack
It is a form of attack wherein a hacker cracks your password with various programs
and password cracking tools like Aircrack, Cain, Abel, John the Ripper, Hashcat,
etc. There are different types of password attacks like brute force attacks, dictionary
attacks, and keylogger attacks.
4. Man-in-the-Middle Attack
As seen below, the client-server communication has been cut off, and instead, the
communication line goes through the hacker.
This results in the attacker being able to view, edit, and delete tables in the
databases. Attackers can also get administrative rights through this.
6. Denial-of-Service Attack
When this happens, catering to the incoming requests becomes overwhelming for
the servers, resulting in the website it hosts either shut down or slow down. This
leaves the legitimate service requests unattended.
7. Insider Threat
As the name suggests, an insider threat does not involve a third party but an insider.
In such a case; it could be an individual from within the organization who knows
everything about the organization. Insider threats have the potential to cause
tremendous damages.
8. Cryptojacking
9. Zero-Day Exploit
< html><head>
<meta charset="utf-8">
</head>
<body onload='document.form1.text1.focus()'>
<div class="mail">
<ul>
<li> </li>
<li> </li>
</ul>
</form>
</div>
<script src="email-validation.js"></script>
</body></html>
47) Write the steps to check the devices connected to your internet and about data usage
Use GlassWire Pro to See Who is Connected (And Get Alerts when
a New Device Connects to Your Wi-Fi)
if you go into the Settings panel, you can actually enable alerts
whenever a new device tries to connect to your Wi-Fi. Now that’s a great
feature
48.Create a Presentation on “Cyber Security Policies 2013” with at least 10 slides
National Cyber Security Policy is a policy framework by Department of Electronics and Information
Technology (DeitY) It aims at protecting the public and private infrastructure from cyber attacks. The
[1] [2]
people. Under pressure, the government unveiled a National Cyber Security Policy 2013 on 2 July 2013.
Vision
To build a secure and resilient cyberspace for citizens, business, and government and also to protect
anyone from intervening in user's privacy.
Mission
To protect information and information infrastructure in cyberspace, build capabilities to prevent and
respond to cyber threat, reduce vulnerabilities and minimize damage from cyber incidents through a
combination of institutional structures, people, processes, technology, and cooperation.
Objective
Ministry of Communications and Information Technology (India) define objectives as follows:
To create a secure cyber ecosystem in the country, generate adequate trust and confidence in IT system
and transactions in cyberspace and thereby enhance adoption of IT in all sectors of the economy.
To create an assurance framework for the design of security policies and promotion and enabling
actions for compliance to global security standards and best practices by way of conformity assessment
(Product, process, technology & people).
To strengthen the Regulatory Framework for ensuring a SECURE CYBERSPACE ECOSYSTEM.
Strategies
Creating a secured Ecosystem.
Creating an assurance framework.
Encouraging Open Standards.
Strengthening The regulatory Framework.
The policy also intends to safeguard "information, such as personal information (of web users), financial
and banking information and sovereign data". This was particularly relevant in the wake of US National
Security Agency (NSA) leaks that suggested the US government agencies are spying on Indian users, who
have no legal or technical safeguards against it. Ministry of Communications and Information
Technology (India) defines Cyberspace as a complex environment consisting of interactions between
people, software services supported by worldwide distribution of information and communication
technology.[2][3][4]
What are the main objectives of the national cybersecurity policy 2013?
The National Cyber Security Policy 2013 aims at secure computing environment, enabling adequate
trust and confidence in electronic transactions and guiding stakeholders actions for the protection of
cyberspace.
49.Create a Presentation on “State and Private sectors in Cyber Space” with at least 10 slides
The authors conclude that cybersecurity is not purely a public good because of all
the money and resources being dedicated to cybersecurity. Firms do not appear to
be free riding off of other firms but are investing in it themselves because of the high
return.
50.Write the steps to read Email Headers and identify them as SPAM
You can easily view email headers in Gmail by following the steps below on a
desktop computer or laptop.
1. Open your Gmail client and select the email that has the message header you
want to view.
2. Access the kebab menu by clicking on the three dots beside the “Reply” button
once you see the message body.
3. Next, select “Show Original” in the dropdown menu.
4. A new window will pop up, displaying the longer header in its original HTML
format. You’ll be able to view header details such as authentication statuses, IP
addresses, MIME version, and DKIM signature.
5. Click on “Download Original” if you want to install and inspect the header data
individually. There are 3 types of verification checks a properly configured set of
emails should PASS: DKIM, SPF, and DMARC By checking various email header
fields
1. Mismatched sender addresses or domains
2. Email travel path and email client.Most emails originate from a client (i.e. Outlook,
Gmail), and all emails pass through at least 2 servers (source, destination), but often
more. These are interim hops are visible in the head.