Lab 1

docx

School

Centennial College *

*We aren’t endorsed by this school

Course

221

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

3

Uploaded by Johnny455

Report
CNET221 Network Security Lab-1 Worksheet Student Name: Amin Vraj Student ID: 301308746 Date: ___ 16-05-2023______ Complete the following sections for Lab-1 in MindTap Upload your Lab Report in the Dropbox by End Date posted on Dropbox. Write your full name and student ID on the front page of your report Start your Lab in MindTap during the scheduled class . You will have upto a week (until next class) to finish it. Complete each section until you reach Tab “Done ”. Remember to click “Done ” otherwise your work be wasted. Lab 1.1 Online Research—Social Engineering by Threat Actors [2 marks] - Social engineering by threat actors refers to the manipulative tactics employed by individuals or groups with malicious intent to deceive and exploit others for unauthorized access, information, or privileges. It involves the use of psychological manipulation techniques to trick individuals into divulging sensitive information, granting unauthorized access, or performing actions that benefit the attacker. Common methods include impersonation, pretexting, phishing, baiting, and tailgating, among others. The goal is to exploit human vulnerabilities and exploit them for personal gain or to facilitate further cyberattacks. Lab 1.2 Online Research—Vulnerabilities in Common Applications and Operating Systems [2 marks] Operating System Vulnerabilities: Operating systems like Windows, macOS, and Linux may have vulnerabilities in their code or configurations that can be exploited. These vulnerabilities can allow attackers to gain unauthorized access, execute arbitrary code, or escalate privileges. Web Browsers: Web browsers such as Google Chrome, Mozilla Firefox, and Microsoft Edge are common targets for exploitation. Vulnerabilities in browsers can be used to deliver malware, execute remote code, or steal sensitive information. Office Productivity Suites: Applications like Microsoft Office, including Word, Excel, and PowerPoint, are commonly used and targeted. Malicious documents or macros can exploit vulnerabilities in these applications to execute malicious code on the victim's computer.
Lab 1.3 Dumpster Diving on Google—Google Dorking [2 marks] Google Dorking, also called dumpster diving on Google, is a way to find hidden or secret information on the internet using specific search techniques. People use special search queries to discover things that were accidentally made public, like confidential files or private login pages. However, it is important to know that using this technique to access or use information that you are not supposed to see is wrong and can be against the law. It is best to respect people's privacy and follow the rules when using search engines or trying to find information online. Lab 1.4 Creating a Windows 10 Virtual Machine for Security Testing [2 marks]
Lab 1.5 Creating a Kali Virtual Machine for Security Testing [2 marks] Note: A CUSTOMISED screenshot of a VM has your lastname and student ID as machine name Example: if your lastname is ABCD and your student ID is 123456789 , the CUSTOMISED VM name will look like 123456789ABCD
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help