Cyber Security Practical Record
Cyber Security Practical Record
2. Write the steps for disk partitioning and perform Operations like
shrinking, extending, deleting and formatting.
Formatting Disk:
1. Open Computer Management by selecting the Start button. The
select Control Panel > System and Security > Administrative Tools, and then
double-click Computer Management.
2. In the left pane, under Storage, select Disk Management.
3. Right-click the volume that you want to format, and then select Format.
4. To format the volume with the default settings, in the Format dialog box,
select OK, and then select OK again.
Shrink the existing volume
Shrink Volume allows you to create a new disk space from the existing disk
and it will be an unallocated region. If you discover that you need an additional
partition but do not have additional disks, you can refer to the following steps to
create it.
Note: If the existing partition contains data, to shrink the partition might destroy
the data. We recommend that you should back up data before shrinking the
partition.
1. Type and search [Computer Management] in the Windows search bar, then
click [Run as administrator].
2. In Computer Management, select [Disk Management].
3. In Disk Management, right-click the existing volume you want an additional
partition, then select [Shrink Volume].
4. Shrink volume will automatically calculate the maximum space that you can
shrink, you also can enter the size you want to shrink, and then
select [Shrink].
5. After the shrink is completed, an unallocated region will be created in Disk
Management, and then you can use the unallocated region to create a new
partition.
Extend the existing volume
Extend Volume allows you to add space to an existing volume, extending it into
empty space on the drive, but only if the empty space doesn’t have a volume on it
and comes immediately after the volume you want to extend, with no other
volumes in-between, as shown in the following image.
1. Type and search [Computer Management] in the Windows search bar, then
click [Run as administrator].
2. In Computer Management, select [Disk Management].
3. In Disk Management, right-click the existing volume you want to extend,
then select [Extend Volume].
If there is no unallocated space, but you want to extend the existing volume,
you are able to delete a separate volume, and then it will become unallocated
space. However, only if the deleted volume comes immediately after the volume
you want to extend, with no other volumes in-between.
Note: The data on it will be deleted if you delete an existing volume, please back
up your files first.
4. In Extend Volume Wizard, select [Next].
5. Enter the size of the volume you want to extend or accept the maximum
default size, and then select [Next]. If the size of the volume you extend does
not reach the maximum default size, the remaining space will still be the
unallocated region.
6. The volume extension is completed, confirm the following settings you set
up, and then select [Finish].
7. You can find the volume that has been extended in Disk Management. If
there is the remaining space, it will still be the unallocated region, and then
the unallocated region that can be created as another partition.
Deleting Partition:
To delete a partition (or volume) with Disk Management, use these steps:
1. Open Start.
2. Search for Disk Management.
3. Select the drive with the partition you want to remove.
4. Right-click (only) the partition you want to remove and select the Delete
Volume option.
5. Click the Yes button to confirm all the data will be erased.
Once you complete the steps, the partition and its contents will no longer be
available on the drive making space available to expand another partition or
format the drive with a new scheme.
6. Write the steps to establish peer to peer network connection using two
systems in a LAN
To setup a peer to peer connection, you must manually configure the IP and
subnet mask address on both the scope and your computer. You can then use an
ethernet cable connected directly between the scope and computer. This will
work on the Linux and Windows version of the 5 or 6 Series MSO.
On the oscilloscope:
1. Open the LAN settings by selecting Utility -> I/O
2. Change the network address setting from Auto to Manual.
3. Manually set an IP address for the instrument – try 128.181.240.130
4. Manually set the Subnet Mask – try 255.255.248.0
5. Push the Apply Changes button.
On the computer:
1. Go your Network Connections menu found in the Control Panel.
2. Right click on the ethernet device that you connected to and select
Properties.
3. Double click on Internet Protocol Version 4 (TCP/IPv4)
4. Select “Use the following IP address” and enter in the IP address and Subnet
Mask. Try 128.181.240.131 and 255.255.248.0. The upper three octets of
the IP address must match the scope setup, and the Subnet Mask must
match exactly.
5. Select “Use the following DNS server addresses”, but leave the fields blank.
Click OK.
The connection should be established and working. You can test it by pinging
the scope from your PC.
Select Close.
11. What do you mean by Spooling Printers? Write the steps for spooling
printer.
A print spooler primarily enables assigning multiple jobs to a printer
without affecting the application or the underlying system performance. A printer
spooler eliminates the need for an application to be kept engaged, until its printing
process is complete.
A printer spooler works when multiple print jobs are sent to a printer.
Computer printers typically take time in printing, therefore other print jobs are
stored in a buffer or print queue. When the printer is available for the next job or
document, it retrieves pending print jobs from the print queue until all documents
are printed.
The printer spooler also enables users to view current jobs within the print
queue, their status, size, time received and the ability to suspend and delete them.
1. Open the Start menu. You can open the Start menu by pressing either the
Windows key on your keyboard, or by clicking the Start icon in the lower
left corner of your screen.
2. Type cmd. In the start menu, type cmd, which is the code for Command
Prompt. You should see the Command Prompt program listed.
3. Open the Command Prompt as an administrator. Right-click the Command
Prompt icon and select Run As Administrator from the dropdown menu.
Click yes on the pop-up warning dialog box.
The command prompt allows you to enter in text-based commands to your
computer. These commands can also be accomplished by using the
graphical interface, your keyboard, and the mouse, but you can sometimes
save time by using the command prompt
4. Type "net stop spooler". Type net stop spooler into the command prompt,
then press ↵ Enter . You will see a line saying, The Print Spooler service is
stopping. After a bit of time, and if successful, you will see The Print Spooler
service was stopped successfully.
5. Delete print jobs. In order for the printer to not just start printing out
documents once you restart spooling, you will have to cancel any
outstanding print jobs. Enter C:\Windows\system32\spool\PRINTERS into
the File Explorer address bar and press ↵ Enter . You may be asked
to Continue as an admin from a pop-up dialog box. Click Continue if
prompted.
Do not delete the PRINTERS folder, only the entries inside.
6. Restart the spooling. In order for your system to print documents in the
future, you will have to restart the spooling service. Type net start
spooler into the command prompt and press ↵ Enter . If successful, you
will see The Print Spooler service was started successfully.
7. Close the Command Prompt. The spooling service should now be
terminated and your printer will no longer print any documents from
the queue. You can close the command prompt.
Output:
Strength of password: -Strong
21. What is Malware? Write the steps to remove the malware from your
PC.
Malware (short for “malicious software”) is a file or code, typically delivered
over a network, that infects, explores, steals or conducts virtually any behaviour
an attacker wants. And because malware comes in so many variants, there are
numerous methods to infect computer systems. Though varied in type and
capabilities, malware usually has one of the following objectives:
Provide remote control for an attacker to use an infected machine.
Send spam from the infected machine to unsuspecting targets.
Investigate the infected user’s local network.
Steal sensitive data.
22. What are the various types of vulnerabilities for hacking the web
applications
SQL Injection:
Injection is a security vulnerability that allows an attacker to alter
backend SQL statements by manipulating the user supplied data.
Injection occurs when the user input is sent to an interpreter as part of command
or query and trick the interpreter into executing unintended commands and gives
access to unauthorized data.
23. Write the steps for sharing files and printer remotely between two
systems
Share the printer on the primary PC
There are two ways to share your printer: using Settings or Control
Panel.
Share your printer using Settings
1. Select the Start button, then select Settings > Devices > Printers &
scanners.
2. Choose the printer you want to share, then select Manage.
3. Select Printer Properties, then choose the Sharing tab.
4. On the Sharing tab, select Share this printer.
5. If you want, edit the share name of the printer. You'll use this name to
connect to the printer from a secondary PC.
Sharing Files:
To share files on a local network using the express settings, use these steps:
Program using C:
/* This program calculates the Key for two persons
using the Diffie-Hellman Key exchange algorithm */
#include<stdio.h>
#include<math.h>
// Power function to return value of a ^ b mod P
long int power(long int a, long int b, long int P)
{
if (b == 1)
return a;
else
return (((long int)pow(a, b)) % P);
}
//Driver program
int main()
{
long int P, G, x, a, y, b, ka, kb;
# import re module
# re module provides support
# for regular expressions
import re
Output:
Valid Email
Valid Email
Invalid Email
1.What are the Roles and Responsibilities of System Administrator? Write the
steps for creating the User account, setting permissions and protecting your files
with password.
The roles and responsibilities of a System Administrator (SysAdmin) are diverse and can vary
based on the organization's size, structure, and specific requirements. Here is a general
overview:
Install, configure, and maintain hardware and software components of computer systems.
Server Management:
Manage servers, ensuring their proper configuration, security, and performance.
Network Administration:
Administer and maintain the organization's network infrastructure, including routers, switches,
firewalls, and other networking devices.
Security Management:
Implement and maintain security measures, including firewalls, antivirus software, and security
patches. Monitor system security and respond to security incidents.
Documentation:
Create and maintain system documentation, including configurations, procedures, and
troubleshooting guides.
Automation:
Implement automation tools and scripts to streamline repetitive tasks and improve efficiency.
Capacity Planning:
Assess and plan for future system requirements by analyzing current usage trends and
forecasting future needs.
Vendor Management:
Interact with vendors to procure hardware and software, as well as to obtain support and
maintenance services.
The steps for creating a user account depend on the operating system you are using. I'll provide
instructions for creating a user account on a Windows system:
Click on the "Start" button and select "Control Panel" from the menu.
Add a User:
Choose the option to "Add someone else to this PC."
These steps are specific to Windows, and the process may differ on other operating systems
such as macOS or Linux.
Introduction:
XYZ Corporation, a multinational company with a strong online presence and critical business
operations, became the victim of a sophisticated ransomware attack that had severe
consequences for its operations, data security, and reputation. This case study aims to provide
insights into the incident, the response, and the lessons learned.
Background:
In early 2022, XYZ Corporation experienced a significant uptick in suspicious network activities.
Employees reported unusual system behavior, and certain files became inaccessible.
Investigation revealed that the organization fell victim to a ransomware attack, with attackers
encrypting critical files and demanding a substantial ransom in cryptocurrency for their release.
Attack Vector:
The initial point of entry was identified as a spear-phishing email that targeted employees with
seemingly legitimate attachments. Once opened, the attachment executed malicious code that
exploited vulnerabilities in the company's systems, allowing the ransomware to propagate.
Impact:
The ransomware quickly spread throughout the organization, encrypting sensitive files and
disrupting business operations. Key consequences included:
Data Loss: Some data, particularly customer information and intellectual property, was
permanently lost due to the encryption.
Downtime: Critical systems were taken offline to prevent further spread, causing a significant
disruption in day-to-day operations.
Financial Loss: The organization incurred financial losses not only from the ransom payment but
also due to the downtime, recovery efforts, and reputational damage.
Response and Mitigation:
XYZ Corporation initiated a swift and coordinated response to mitigate the impact of the
ransomware attack:
Isolation: Affected systems were isolated from the network to prevent further spread of the
ransomware.
Incident Response Team: An incident response team was formed to investigate the extent of the
breach, identify the ransomware variant, and plan the recovery process.
Backup Restoration: Backups of critical data were restored to minimize data loss and resume
normal business operations.
Communication: Clear and transparent communication was established with employees,
customers, and stakeholders to provide updates on the situation, assure them of the measures
taken, and manage expectations.
Lessons Learned:
Employee Training: Regular and comprehensive training on cybersecurity awareness, especially
regarding phishing attacks, was identified as a crucial preventive measure.
Patch Management: Strengthening the organization's patch management process to promptly
address and apply security updates could have potentially thwarted the initial attack vector.
Data Backups: Regular and secure backups of critical data are essential to facilitate quick
recovery without succumbing to ransom demands.
Incident Response Plan: The importance of a well-defined incident response plan and the need
for regular drills became evident in enhancing the organization's resilience against cyber
threats.
Conclusion:
The ransomware attack on XYZ Corporation underscored the evolving and persistent nature of
cyber threats. By learning from this incident, organizations can better prepare themselves
against future attacks, strengthen their cybersecurity measures, and minimize the potential
impact on their operations and reputation.
4. Write the steps for installation of software from Open source Mode and Paid
subscription mode.
The steps for installing software can vary based on the operating system and the distribution
model (open source or paid subscription). Below, I'll provide a general overview of the steps for
both scenarios:
Choose the open-source software you want to install. Make sure it is available in a format
compatible with your operating system.
2. Download the Software:
Visit the official website or a trusted source for the open-source project and download the
software package. The website usually provides clear instructions on where to find the
download.
3. Extract the Files (if necessary):
If the software is distributed as a compressed archive (e.g., ZIP or TAR), extract the files to a
location on your computer.
4. Read Documentation:
Check for any documentation or installation guides provided by the software project. This
information can be crucial for successful installation.
5. Installation Process:
Open a terminal or command prompt and navigate to the directory where you extracted the files.
Follow the instructions in the README or installation documentation.
Use specific commands or scripts provided to configure and install the software.
6. Verify Installation:
After the installation is complete, verify that the software is working as expected.
Paid Subscription Software Installation:
1. Purchase or Subscribe:
Obtain a license or subscription for the software from the official website or an authorized
reseller.
2. Receive Installation Instructions:
Upon purchase, you will likely receive an email or documentation containing installation
instructions and license details.
3. Download Installer:
Visit the official website and download the installer for the software. Often, there will be a
dedicated section for subscribers or licensed users.
4. Run the Installer:
Execute the downloaded installer. Follow the on-screen instructions to install the software.
5. Enter License Information:
During the installation process or upon first launch, you may be prompted to enter the license
key or subscription details. Provide the required information.
6. Configuration (if necessary):
Depending on the software, you may need to configure settings during or after the installation.
7. Activation:
Some paid software requires online activation. Ensure that your computer has internet access
and follow any additional activation steps.
8. Verify Installation:
After installation and activation, verify that the software is functioning correctly.
Remember to always follow the specific instructions provided by the software vendor, as the
installation steps can vary. Additionally, pay attention to licensing terms and ensure compliance
with any terms and conditions associated
5. Write the steps to make Microsoft Chrome as a default browser, Add Active X
Controls and Add–on to the Bowser.
It seems there might be a bit of confusion in your request. There is no browser called "Microsoft
Chrome." Microsoft Edge is a web browser developed by Microsoft, and Google Chrome is a
separate browser developed by Google. I'll provide you with steps for making Microsoft Edge
your default browser and adding ActiveX controls and add-ons to it. If you meant Google
Chrome, please clarify, and I'll provide instructions accordingly.
Web Browser:
Under "Web browser," click on the current default browser and choose "Microsoft Edge" from
the list.
Adding ActiveX Controls and Add-ons to Microsoft Edge:
Microsoft Edge primarily uses Extensions instead of traditional ActiveX controls.
Go to Extensions:
Click on the three dots in the top-right corner to open the menu, then select "Extensions."
Get Extensions:
Click on "Get extensions from Microsoft Store" to explore and add extensions from the Microsoft
Edge Add-ons website.
Manage Extensions:
After installation, you can manage your extensions by clicking on "Manage extensions" in the
Extensions menu. Here, you can enable, disable, or remove extensions.
Please note that Microsoft Edge does not support ActiveX controls, as they are an Internet
Explorer technology. If you have a specific requirement for ActiveX controls, you might need to
use Internet Explorer instead.
If you meant Google Chrome or if you have additional requirements, please provide more
details, and I'll be happy to assist you further.
8. Write the steps to Install and configure Network Components like switches,
Hub and Modem and how do you connect to Dial-Up networking.
Installing and configuring network components like switches, hubs, modems, and connecting to
dial-up networking involve several steps. Below are general instructions for each component:
Many switches operate as plug-and-play devices. However, managed switches may require
additional configuration.
Connect to the switch using a console cable and configure settings such as VLANs, port
security, etc.
2. Hub:
Installation:
Hubs are basic networking devices and usually do not require configuration.
3. Modem:
Installation:
Some modems may require initial setup, often done through a web-based interface. Consult the
modem's documentation for details.
Connect to Dial-Up Networking:
1. Install Modem Drivers:
Ensure that the modem drivers are installed on your computer. Most modern operating systems
automatically detect and install drivers for common modems.
2. Connect Modem to Computer:
Physically connect the modem to your computer using the appropriate cable (usually a USB or
serial cable).
3. Configure Dial-Up Connection:
Windows:
Open the "Control Panel" and navigate to "Network and Sharing Center."
Click on "Set up a new connection or network."
Choose "Dial-up" and follow the wizard to set up the connection.
Enter the ISP's phone number, username, and password.
macOS:
Always refer to the specific documentation for each device and operating system, as steps may
vary based on the equipment and software versions you are using.
9. What are the features of firewall? Write the steps in providing network security
and to set Firewall Security in windows.
Features of a Firewall:
Packet Filtering: Examines data packets and allows or denies them based on predefined rules.
Stateful Inspection: Keeps track of the state of active connections and makes decisions based
on the context of the traffic.
Proxy Services: Acts as an intermediary for requests from clients seeking resources from other
servers, enhancing security and anonymity.
Network Address Translation (NAT): Modifies network address information in packet headers to
protect internal network structure.
Logging and Monitoring: Records events, accesses, and violations for analysis and auditing
purposes.
Virtual Private Network (VPN) Support: Facilitates secure remote access or interconnectivity
between networks over the internet.
Intrusion Detection and Prevention System (IDPS) Integration: Monitors and analyzes network
or system activities for potential threats.
User Authentication: Ensures that only authorized users or systems gain access to the network.
Application Layer Filtering: Allows or blocks traffic based on specific applications or protocols.
Bandwidth Management: Controls and allocates network bandwidth to prevent abuse or ensure
fair usage.
Open Settings:
Under "Firewall & network protection," you will see options for domain, private, and public
network profiles.
For each profile, you can toggle the switch to turn the Windows Defender Firewall on or off.
Advanced Settings:
For more detailed configuration, click on "Advanced settings." This opens the Windows
Defender Firewall with Advanced Security console.
Configure Rules:
In the Advanced Security console, you can configure inbound and outbound rules, allowing you
to specify which programs or services are allowed or blocked.
Create New Rule:
To create a new rule, right-click on "Inbound Rules" or "Outbound Rules" and select "New Rule."
Follow the wizard to define the rule.
Adjust Notifications:
In the Advanced Security console, you can also configure notification settings to receive alerts
about blocked connections.
Monitoring and Logging: