Cyber Security
Cyber Security
[CSIT371]
CYBER SECURITY AND
CYBER-LAWS
Step 6: Now, a new window will open. This is our desired window.
There is no need to provide a Microsoft Account. We need to provide
a Username there. Also, we need to provide a password for that.
There we have to provide a password hint for that. This is like a
Security Question we used to provide for any password. As per the
convenience of the user, they can provide any data. After that, we
need to click on Next.
Step 7: After that, it will come back to the Accounts Page. We will
find new user data on that page. We have provided the Username as
User2.
Step 8: Now, we can restart the machine. Or we can log out from the
device. There we will find the User2 account present. Users can log in
with the User2 account by providing the password.
EXPERIMENT 2
How to Set up Firewall in windows security
Step 1: Launch Start from the taskbar.
Step 2: Search “Settings” in the search bar if you do not find the
Settings icon in Start menu.
Step 12: Now select TCP and specify port number 65000.
Step 13: Now we can select the action we need to take on this port.
We will block the inbound connection by selecting Block the
connection option then click Next.
Step 14: Here we can specify when should this rule come into
action. We will keep only Public option selected and move Next.
Step 15: This is the last step. Here we provide a name to this rule so
that we can keep track of it later in the Inbound rules list. Write the
name “65000 Port Block (Public)”. Click Finish.
Step 17: Right-click the rule we just created and there are
multiple options with which it can be Disabled or Deleted.
Dark Web Monitoring: Google offers tools that monitor the dark web
for compromised personal information, alerting users if their data is
found and providing steps to secure their accounts.
Step 5: A Encrypt Document dialog box will open where you can set
your password.
Step 6: Create a strong password for your document.
2. Integrity
Integrity ensures that data remains accurate, consistent, and unaltered
during storage, processing, or transmission, except by authorized actions.
Key Concepts:
o Data Validation: Ensuring input data meets required standards or
formats.
o Checksums and Hashing: Verifying the integrity of data by
comparing hash values before and after transmission.
o Version Control: Keeping track of changes to data or files.
o Audit Trails: Recording changes made to data, including who
made them and when.
Risks to Integrity:
o Accidental or deliberate data modification by unauthorized
users.
o Malware or ransomware attacks altering data.
o Transmission errors causing corruption.
Examples:
o Ensuring financial transactions are completed without
modification.
o Using digital signatures to verify the authenticity of a document
or message.
3. Availability
Availability ensures that authorized users have timely and reliable access to
information and systems when needed.
Key Concepts:
o Redundancy: Using backup systems, data replication, and failover
mechanisms to ensure system continuity.
o Disaster Recovery Plans: Preparing for events like natural
disasters or cyberattacks to recover data and systems quickly.
o System Maintenance: Regular updates and patching to avoid
unplanned downtime.
o Load Balancing: Distributing workloads across multiple systems
to prevent bottlenecks or outages.
Risks to Availability:
o Distributed Denial of Service (DDoS) attacks overwhelming a
system.
o Hardware or software failures.
o Natural disasters or power outages disrupting services.
Examples:
o Setting up cloud-based backups for critical data.
o Implementing network monitoring to detect and mitigate
potential threats.