0% found this document useful (0 votes)
18 views18 pages

Cyber Security Lab Record

The document outlines the roles and responsibilities of a System Administrator, including tasks such as installing software, managing network servers, and ensuring IT security. It provides detailed steps for creating user accounts, managing disk partitions, configuring WiFi, and removing malware, among other IT management tasks. Additionally, it discusses vulnerabilities in web applications and offers guidance on sharing files and printers remotely.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views18 pages

Cyber Security Lab Record

The document outlines the roles and responsibilities of a System Administrator, including tasks such as installing software, managing network servers, and ensuring IT security. It provides detailed steps for creating user accounts, managing disk partitions, configuring WiFi, and removing malware, among other IT management tasks. Additionally, it discusses vulnerabilities in web applications and offers guidance on sharing files and printers remotely.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

1.

) What are the Roles and Responsibilities of System


Administrator? Write the steps for creating the user account,
setting permissions and protecting your files with password.
Sysadmins are responsible for administration, management, and
support activities associated with the IT infrastructure at a multi-
user organization.

System Administrator responsibilities include:


 Installing and configuring software, hardware and networks
 Monitoring system performance and troubleshooting issues
 Ensuring security and efficiency of IT infrastructure
 Manage network servers and technology tools
 Set up accounts and workstations
 Ensure security through access controls, backups and firewalls
 Upgrade systems with new releases and models
 Develop expertise to train staff on new technologies
 Build an internal wiki with technical documentation, manuals
and IT policies
1 prgm Create a local user account
1.Select Start > Settings > Accounts and then select Family & other
users. (In some versions of Windows you’ll see Other users.)
2 Select Add someone else to this PC.
Select I don’t have this person’s sign-in information, and
on the next page, select Add a user without a Microsoft account.
Enter a user name, password, or password hint—or choose security
questions—and then select Next.
How to password protect a folder in Windows
1. Open Windows Explorer and find the folder you want to password
protect, and then right-click on it.
2. Select “Properties.” How to password protect a folder 1 You need to
select this option from the pop-up window that appears. Melanie
Weir/Business Insider
3. Click “Advanced.
4. At the bottom of the Advanced Attributes menu that appears, check
the box labeled “Encrypt contents to secure data.”
5. Click “OK.”
6. Upon returning to the main window, click “Apply.”
7. On the “Confirm Attribute Changes” window, choose between “Apply
changes to this folder only” or “Apply changes to this folder, subfolders
and files.”
8. Select “OK.”
9. A notification prompting you to back up your file encryption key will
appear. Click “Backup now.”
10. Insert a USB flash drive to your computer, and follow the on-screen
instructions to create your encryption certificate and export to the USB
drive.

2. Write the steps for disk partitioning and perform


operations like shrinking, Extending, deleting and
formatting.
1. If you are using Windows 8, type Disk Management at the start
screen, click on Settings, and then click on the Create and format hard
disk partitions option.
Then skip to step 3. Otherwise, click on the Start button and select the
Control Panel option.
2. If in Classic control panel mode, double-click on the Administrative
Tools icon and then double-click on Computer Management icon. If your
control panel is in the Category view, click on Performance and
Maintenance, then click on Administrative Tools, and finally double-click
on the Computer Management icon.
3. When the Computer Management screen opens, click on the Disk
Management option under the Storage category. This will present you
with a screen similar to the one below. When you are in the disk
management tool you will see a listing of your current hard drives and
how they are partitioned.
To delete a partition please follow these steps:
1. Click on the Start button and select the Control Panel option.
2. If in Classic control panel mode, double-click on the Administrative
Tools icon and then double-click on Computer Management icon. If your
control panel is in the Category view, click on Performance and
Maintenance, then click on Administrative Tools, and finally double-click
on the Computer Management icon.
3. When the Computer Management screen opens, click on the Disk
Management option under the Storage category.
4. Right-click on the partition you would like to delete and choose the
Delete Partition option.
5. A confirmation box will come up asking if you are sure you would like
to continue. If you press the yes button, all data on this partition will be
deleted. If you are sure about deleting this partition, press the Yes
button. The partition will now be deleted and you can either create a
new partition or exit the program.
3. Prepare a case study on Ransomware attacks ( Ex. Media Markt)
3. Write the steps for installation of software from Open
source mode and Paid subscription mode

Alternatively, you could follow these steps:


 Download and uncompress the source code.
 In the terminal, move into the extracted directory.
 Run "./configure" to configure the software.
 Run "make" to compile the software.
 Run "make install" to install the software.

4 b Installation of software form paid subscription mode.


You can follow the steps below to install an application from an .exe file.
Locate and download an .exe file.
4.2 Locate and double-click the .exe file. (It will usually be in your Downloads folder.)
4. The software will be installed. You can now open the application from the Start menu
(Windows 7) or the Start Screen (Windows 8)
4. Write the steps to make Microsoft Chrome as a default browser. Add
Active X Controls and Add-on to the browser.

1.On your computer, click the Start menu .


2.Click Control Panel.
3.Click Programs Default Programs. Set your default programs.
4.On the left, select Google Chrome.
5.Click Set this program as default.
6.Click OK.
5. What is WiFi? How do you configure the WiFi on Windows
Operating System.
WiFi, short for Wireless Fidelity, is a technology that allows
electronic devices such as computers, smartphones, and
tablets to connect to the internet or other wireless networks
using radio waves. It uses a wireless access point or router to
transmit and receive data between devices, allowing them to
communicate with each other and access the internet without
the need for cables or wires. WiFi is widely used in homes,
offices, public spaces, and other locations to provide wireless
internet access and connectivity to a range of devices.
The following steps explain the process in a simple and easy way:
1Get the right router. …
2.Connect the router to the modem. …
3.Connect the computer with Ethernet cable. …
4.Install router software. …
5.Open configuration page. …
6.Enter the internet connection information. …
7.Secure the router. …
8.Set the wireless settings.
6. Write the steps to transfer files between wireless communication using blue
tooth and FTP
Before you can send files to a Windows PC using Bluetooth, you’ll
first need to turn Bluetooth on to allow it to connect to your PC.
• To do this, you’ll need to access the Bluetooth settings menu.
Start by right-clicking the Windows Start menu and clicking
Settings.
In the Settings menu, click Devices > Bluetooth to access your Bluetooth settings. To enable
Bluetooth, click the slider next to the Bluetooth option. You’ll know that Bluetooth is enabled
because On will appear next to the slider once Bluetooth has been enabled

You’ll need to allow Bluetooth devices to find your PC. To do this,


click the More Bluetooth options option under the Related
settings section on the right.
Under the Options tab, click to enable the checkbox next to the
Allow Bluetooth devices to find this PC option.

•You’ll probably want to quickly access your Bluetooth devices


and settings from the Bluetooth taskbar icon, but this may not be
enabled by default. To enable this, click to enable the checkbox
next to the Show the Bluetooth icon in the notifications
area option, shown under the Options tab of the Bluetooth
Settings window.

Click OK to save.
With these settings enabled, you can now transfer files via Bluetooth from other devices. This
process will differ, depending on the type of device you’re using.

7. What is malware? Write the steps to remove the malware from your PC.
Malware, short for malicious software, is any type of software designed to
harm or exploit a computer system, network, or device. Malware can
come in many forms, including viruses, trojans, spyware, ransomware,
and adware.

Here are the steps to remove malware from your PC:

1. Install and update antivirus software: Install a reputable antivirus


program on your computer and make sure it is up-to-date with the
latest virus definitions. You can use free or paid antivirus software,
but make sure it is a trusted and reliable product.
2. Disconnect from the internet: Disconnect your computer from the
internet to prevent the malware from communicating with its
command-and-control server or spreading to other devices on your
network.
3. Run a full scan: Open your antivirus program and run a full system
scan to detect and remove any malware present on your computer.
Follow the prompts to quarantine or delete any infected files found
during the scan.
4. Restart your computer: Restart your computer to complete the
malware removal process and ensure that all malware-related
processes have been terminated.
5. Update your software: Make sure all of your software and operating
system are up-to-date with the latest security patches and updates.
This will help prevent future malware attacks.
6. Change your passwords: Change any passwords that may have
been compromised by the malware, such as online banking or email
accounts. Use strong and unique passwords for each account.
7. Monitor your system: Monitor your computer for any unusual activity
or behavior, such as slow performance, pop-ups, or unusual network
activity. If you suspect that your computer may still be infected with
malware, run another virus scan or seek professional help.

8. What are the various types of vulnerabilities for hacking the web
applications.
There are various types of vulnerabilities that can be exploited by hackers
to compromise web applications. Here are some of the most common
types of web application vulnerabilities:

1. Injection flaws: These vulnerabilities occur when untrusted user


input is passed to a web application and not properly sanitized,
allowing an attacker to inject malicious code or commands into the
system. Common examples include SQL injection, command
injection, and LDAP injection.
2. Cross-site scripting (XSS): XSS attacks occur when an attacker is
able to inject malicious scripts into a web page viewed by other
users. This can be used to steal user data, hijack user sessions, or
spread malware.
3. Broken authentication and session management: These
vulnerabilities occur when web applications do not properly handle
user authentication or session management, allowing attackers to
steal user credentials, hijack user sessions, or bypass access
controls.
4. Security misconfigurations: These vulnerabilities occur when web
servers, applications, or databases are not properly configured or
patched, allowing attackers to exploit weaknesses in the system.
5. Cross-site request forgery (CSRF): CSRF attacks occur when an
attacker is able to trick a user into performing an action on a web
application without their knowledge or consent. This can be used to
steal sensitive data or perform malicious actions on the user's
behalf.
6. Broken access controls: These vulnerabilities occur when web
applications do not properly restrict access to sensitive data or
functionality, allowing attackers to access data or perform actions
they should not be allowed to.
7. Insecure cryptography: These vulnerabilities occur when web
applications use weak or outdated encryption methods, allowing
attackers to intercept and decrypt sensitive data.
8. File inclusion vulnerabilities: These vulnerabilities occur when web
applications allow users to include external files or scripts, which
can be used to execute arbitrary code or read sensitive data.

9.Write the steps for sharing files and printer remotely between two systems
1. Connect both computers to the same network: The first step is to
ensure that both computers are connected to the same network,
either through Ethernet cables or wirelessly.
2. Enable file and printer sharing: On the computer that you want to
share files or printers from, navigate to the Network and Sharing
Center in the Control Panel and select "Change advanced sharing
settings". Turn on file and printer sharing and make sure that
network discovery is enabled.
3. Share the printer: On the computer that has the printer connected,
navigate to the printer properties and select the "Sharing" tab.
Check the box to share the printer and give it a name.
4. Share the files: Select the files or folders that you want to share and
right-click on them. Choose "Properties" and select the "Sharing"
tab. Click "Share" and choose the user or group that you want to
share the files with.
5. Access the shared printer or files: On the remote computer,
navigate to the Network and Sharing Center and select "View
computers and devices". Double-click on the computer that has the
shared printer or files and enter the username and password if
prompted. You should now be able to access the shared printer or
files.
10. Create a presentation on “Ethical hacking” atleast 10 slides.

1. Open Microsoft PowerPoint: First, open Microsoft PowerPoint on your


computer.
2. Choose a design template: Select a design template that suits your
presentation from the available options in the "Design" tab.
3. Create your first slide: Click on the "Insert" tab and select "New
Slide" to create your first slide. Choose the layout of your slide from
the available options, and then add the content related to ethical
hacking such as text, images, or charts.
4. Add more slides: To add more slides, click on "New Slide" again and
repeat the process. You can add up to ten slides for your
presentation.
5. Customize your slides: Customize each slide by changing the
background, color scheme, or font style from the "Design" tab.
6. Add transitions and animations: To make your presentation more
engaging, you can add transitions between slides and animations to
specific elements on each slide. Click on the "Animations" tab to
access these features.
7. Review and finalize your presentation: Once you have created your
slides, review your presentation to ensure that it flows smoothly and
contains all the necessary information. Save your presentation and
practice presenting it to ensure that you are confident with your
delivery.

11.Create a presentation on Security Protocols (atleast 5 slides)

1. Open Microsoft PowerPoint: First, open Microsoft PowerPoint on your


computer.
2. Choose a design template: Select a design template that suits your
presentation from the available options in the "Design" tab.
3. Create your first slide: Click on the "Insert" tab and select "New
Slide" to create your first slide. Choose the layout of your slide from
the available options, and then add your content on security
protocols such as text, images, or charts.
4. Add more slides: To add more slides, click on "New Slide" again and
repeat the process. You can add up to five slides for your
presentation.
5. Customize your slides: Customize each slide by changing the
background, color scheme, or font style from the "Design" tab.
6. Add transitions and animations: To make your presentation more
engaging, you can add transitions between slides and animations to
specific elements on each slide. Click on the "Animations" tab to
access these features.
7. Review and finalize your presentation: Once you have created your
slides, review your presentation to ensure that it flows smoothly and
contains all the necessary information. Save your presentation and
practice presenting it to ensure that you are confident with your
delivery.

12. Write the steps to detect the number of devices connected to WiFi and
block un authorized devices.
1. Access your router's settings: In order to detect and block devices
on your WiFi network, you need to access your router's settings. To
do this, open a web browser and enter your router's IP address into
the address bar. This can typically be found on the bottom of your
router or in the manual.
2. Log in to your router: Enter your router's username and password to
log in to the router settings page. If you have not changed the
default login credentials, these can typically be found in the manual.
3. Check connected devices: Look for a section in the router settings
that displays the devices currently connected to your WiFi network.
This may be called "Connected Devices," "Device List," or something
similar.
4. Block unauthorized devices: If you see any devices that you don't
recognize or don't want on your network, you can typically block
them from the router settings page. Look for an option to block or
disconnect devices, and follow the prompts to block the
unauthorized device.
5. Set up MAC filtering: Another way to block unauthorized devices is
to set up MAC filtering. Each device has a unique MAC address that
can be used to restrict access to your WiFi network. In the router
settings, look for an option to set up MAC filtering and add the MAC
addresses of the devices that you want to allow or block.
6. Save your changes: Once you have made any changes to your
router settings, be sure to save your changes before exiting the
settings page.

13. Write the steps to analyze the E-Mail Application’s security


vulnerabilities.
1. Identify the scope of the analysis: Determine the scope of the
analysis, including the type of email application being analyzed, the
platform it runs on, and any other relevant factors.
2. Gather information: Gather as much information as possible about
the email application, including its architecture, features, and
security controls.
3. Identify potential threats: Identify potential threats to the email
application's security, such as unauthorized access, data breaches,
phishing attacks, or malware infections.
4. Conduct a vulnerability assessment: Conduct a vulnerability
assessment by using automated tools, manual testing, or a
combination of both to identify vulnerabilities in the email
application.
5. Prioritize vulnerabilities: Prioritize the vulnerabilities based on their
impact, likelihood of occurrence, and ease of exploitation.
6. Develop a plan to mitigate vulnerabilities: Develop a plan to
mitigate the vulnerabilities, including applying patches or updates,
modifying security configurations, or implementing additional
security controls.
7. Test the mitigation plan: Test the mitigation plan to ensure that it
effectively addresses the identified vulnerabilities without
introducing any new security issues.
8. Monitor and review: Monitor the email application's security on an
ongoing basis and review the effectiveness of the mitigation plan
regularly.
9. Document the analysis: Document the analysis, including the
vulnerabilities identified, the mitigation plan, and any ongoing
monitoring or testing activities.

By following these steps, you can identify and address security


vulnerabilities in an email application, reducing the risk of data breaches
and other security incidents.
14.Create a Presentation on “Cyber Security Regulations” with at least
10 slides
1. Open Microsoft PowerPoint: First, open Microsoft PowerPoint on your
computer.
2. Choose a design template: Select a design template that suits your
presentation from the available options in the "Design" tab.
3. Create your first slide: Click on the "Insert" tab and select "New
Slide" to create your first slide. Choose the layout of your slide from
the available options, and then add your content on cyber security
regulations such as text, images, or charts.
4. Add more slides: To add more slides, click on "New Slide" again and
repeat the process. You can add up to ten slides for your
presentation.
5. Customize your slides: Customize each slide by changing the
background, color scheme, or font style from the "Design" tab.
6. Add transitions and animations: To make your presentation more
engaging, you can add transitions between slides and animations to
specific elements on each slide. Click on the "Animations" tab to
access these features.
7. Review and finalize your presentation: Once you have created your
slides, review your presentation to ensure that it flows smoothly and
contains all the necessary information. Save your presentation and
practice presenting it to ensure that you are confident with your
delivery.

15.Create a Presentation on “Role of International Law” with at least 10


slides
1. Open Microsoft PowerPoint: First, open Microsoft PowerPoint on your
computer.
2. Choose a design template: Select a design template that suits your
presentation from the available options in the "Design" tab.
3. Create your first slide: Click on the "Insert" tab and select "New
Slide" to create your first slide. Choose the layout of your slide from
the available options, and then add your content on Role of
international law such as text, images, or charts.
4. Add more slides: To add more slides, click on "New Slide" again and
repeat the process. You can add up to ten slides for your
presentation.
5. Customize your slides: Customize each slide by changing the
background, color scheme, or font style from the "Design" tab.
6. Add transitions and animations: To make your presentation more
engaging, you can add transitions between slides and animations to
specific elements on each slide. Click on the "Animations" tab to
access these features.
7. Review and finalize your presentation: Once you have created your
slides, review your presentation to ensure that it flows smoothly and
contains all the necessary information. Save your presentation and
practice presenting it to ensure that you are confident with your
delivery.

16.Create a Presentation on “Cyber Forensics” with at least 10 slides


1. Open Microsoft PowerPoint: First, open Microsoft PowerPoint on
your computer.
2. Choose a design template: Select a design template that suits your
presentation from the available options in the "Design" tab.
3. Create your first slide: Click on the "Insert" tab and select "New
Slide" to create your first slide. Choose the layout of your slide from
the available options, and then add your content on cyber forensics
such as text, images, or charts.
4. Add more slides: To add more slides, click on "New Slide" again and
repeat the process. You can add up to ten slides for your
presentation.
5. Customize your slides: Customize each slide by changing the
background, color scheme, or font style from the "Design" tab.
6. Add transitions and animations: To make your presentation more
engaging, you can add transitions between slides and animations to
specific elements on each slide. Click on the "Animations" tab to
access these features.
7. Review and finalize your presentation: Once you have created your
slides, review your presentation to ensure that it flows smoothly and
contains all the necessary information. Save your presentation and
practice presenting it to ensure that you are confident with your
delivery.

17.Create a Presentation on “Cyber Security Standards” with at least 10


slides
1. Open Microsoft PowerPoint: First, open Microsoft PowerPoint on your
computer.
2. Choose a design template: Select a design template that suits your
presentation from the available options in the "Design" tab.
3. Create your first slide: Click on the "Insert" tab and select "New
Slide" to create your first slide. Choose the layout of your slide from
the available options, and then add your content on cyber security
standards such as text, images, or charts.
4. Add more slides: To add more slides, click on "New Slide" again and
repeat the process. You can add up to ten slides for your
presentation.
5. Customize your slides: Customize each slide by changing the
background, color scheme, or font style from the "Design" tab.
6. Add transitions and animations: To make your presentation more
engaging, you can add transitions between slides and animations to
specific elements on each slide. Click on the "Animations" tab to
access these features.
7. Review and finalize your presentation: Once you have created your
slides, review your presentation to ensure that it flows smoothly and
contains all the necessary information. Save your presentation and
practice presenting it to ensure that you are confident with your
delivery.

18.Create a Presentation on “Cyber Security Attacks” with at least 10


slides
1. Open Microsoft PowerPoint: First, open Microsoft PowerPoint on your
computer.
2. Choose a design template: Select a design template that suits your
presentation from the available options in the "Design" tab.
3. Create your first slide: Click on the "Insert" tab and select "New
Slide" to create your first slide. Choose the layout of your slide from
the available options, and then add your content on cyber security
attacks such as text, images, or charts.
4. Add more slides: To add more slides, click on "New Slide" again and
repeat the process. You can add up to ten slides for your
presentation.
5. Customize your slides: Customize each slide by changing the
background, color scheme, or font style from the "Design" tab.
6. Add transitions and animations: To make your presentation more
engaging, you can add transitions between slides and animations to
specific elements on each slide. Click on the "Animations" tab to
access these features.
7. Review and finalize your presentation: Once you have created your
slides, review your presentation to ensure that it flows smoothly and
contains all the necessary information. Save your presentation and
practice presenting it to ensure that you are confident with your
delivery.

19.Create a Presentation on “Cyber Security Policies 2013” with at least


10 slides
1. Open Microsoft PowerPoint: First, open Microsoft PowerPoint on your
computer.
2. Choose a design template: Select a design template that suits your
presentation from the available options in the "Design" tab.
3. Create your first slide: Click on the "Insert" tab and select "New
Slide" to create your first slide. Choose the layout of your slide from
the available options, and then add your content on cyber security
policies 2013 such as text, images, or charts.
4. Add more slides: To add more slides, click on "New Slide" again and
repeat the process. You can add up to ten slides for your
presentation.
5. Customize your slides: Customize each slide by changing the
background, color scheme, or font style from the "Design" tab.
6. Add transitions and animations: To make your presentation more
engaging, you can add transitions between slides and animations to
specific elements on each slide. Click on the "Animations" tab to
access these features.
7. Review and finalize your presentation: Once you have created your
slides, review your presentation to ensure that it flows smoothly and
contains all the necessary information. Save your presentation and
practice presenting it to ensure that you are confident with your
delivery.

20.Create a Presentation on “State and Private sectors in Cyber Space”


with at least 10 slides
1. Open Microsoft PowerPoint: First, open Microsoft PowerPoint on
your computer.
2. Choose a design template: Select a design template that suits your
presentation from the available options in the "Design" tab.
3. Create your first slide: Click on the "Insert" tab and select "New
Slide" to create your first slide. Choose the layout of your slide from
the available options, and then add your content on state and
private sectors in cyber space such as text, images, or charts.
4. Add more slides: To add more slides, click on "New Slide" again and
repeat the process. You can add up to ten slides for your
presentation.
5. Customize your slides: Customize each slide by changing the
background, color scheme, or font style from the "Design" tab.
6. Add transitions and animations: To make your presentation more
engaging, you can add transitions between slides and animations to
specific elements on each slide. Click on the "Animations" tab to
access these features.
7. Review and finalize your presentation: Once you have created your
slides, review your presentation to ensure that it flows smoothly and
contains all the necessary information. Save your presentation and
practice presenting it to ensure that you are confident with your
delivery.

You might also like