COMP 552-{Lab4}-{L01}-{SAIBHARAD LAKSHMI NARAYANAN}-{LAB REPORT}

docx

School

Fleming College *

*We aren’t endorsed by this school

Course

552

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

9

Uploaded by JusticeBat3671

Report
COMP 552 Introduction to Cybersecurity Lab Report #: Week 4 Multiboot USB Toolkit. Due Date: 2023/10/06 Submission Method: D2L Dropbox Submitted by: SAIBHARAD LAKSHMI NARAYANAN Student ID: 10308692 Section :01 Professor submitted to: Manan Kaushibhai Patel Introduction: Page 1 of 9
COMP 552 Introduction to Cybersecurity The Main Goal of this lab is to explore the Multiboot USB Toolkit and how it may be used in the field of information security to ensure the data is safeguarded. In most cases, this multibooting technique is utilized to install all applications and transfer data before deleting the previous OS. In this lab we will install numerous utilities, software and analyze the test with hash values to check the authenticity. Activities: Several steps are taken in this lab for Multiboot software. The First step is to obtain the Ventoy software from the website https://www.ventoy.net/ . I have downloaded the Ventoy 1.0.96 which was the latest at the time of installation. Then the Ventoy is copied to the USB Stick. To check the hash values a Software called GTKHash is installed. By comparing the Hash values, we can ensure the data’s authenticity is preserved. Make sure that after these adjustments, any data on the USB Stick will be Erased. The Second part of the Lab is to Download Linux Mint, and the same procedure is followed as above. The Third Component of the lab is activity entails downloading two utilities of interest, explaining why they were chosen, and detailing how IT professionals can use these tools on a multiboot USB. Finally, discuss and comprehend the differences between BIOS And UEFI. Discussion: Image 1 Shows the Ventoy File Inetegrity Check. Page 2 of 9
COMP 552 Introduction to Cybersecurity Image 2 Check the hash values of Linux And Ubuntu. Page 3 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
COMP 552 Introduction to Cybersecurity The Two Utilities that were installed in the Windows 11 are PepperMint and Debian are both Multiboot USB creators which are free and available for Windows. Page 4 of 9
COMP 552 Introduction to Cybersecurity Debian is a free Software which works smoothly on Windows 11 and its ability to format and create a bootable USB Stick.[ CITATION Chr22 \l 4105 ]. The boot procedure differs between legacy BIOS (Basic Input/Output System) and UEFI (Unified Extensible Firmware Interface). Legacy bios employs the master boot record to locate and load the bootloader. The UEFI boot process is complicated, including a boot manager, EFI bootloaders, and an EFI system partition. Legacy BIOS boots slower owing to older architecture, but UEFI boots considerably faster due to hardware initialization. Legacy bios partitioning is limited to 2.2TB disc space. UEFI, on the other hand, uses GPT partitioning with greater disc capacities and more partitions for improved data integrity. In terms of security, older bios are more prone to rootkits and boot time malware. UEFI, on the other hand, ensures secure boot. Steps to take Restart, then press Esc, and finally click F9 for to disable boot menu. Conclusion: I have uploaded the output of Required below. Finally, this lab activity assisted in learning how to use the Multiboot USB toolkit in the field of information security, as well as the process of downloading various software and performing hash value checks to validate data authenticity and demonstrating booting using the USB drive and returning to the original values once completed. Page 5 of 9
COMP 552 Introduction to Cybersecurity Page 6 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
COMP 552 Introduction to Cybersecurity Page 7 of 9
COMP 552 Introduction to Cybersecurity Page 8 of 9
COMP 552 Introduction to Cybersecurity References Christos Pontikis. (2022, Feb 11). Debian . Retrieved from debian.org: https://www.debian.org/intro/why_debian For a retrospective future. (2023). Retrieved from Ubuntu Mate: https://ubuntu-mate.org/ Modern enterprise open source . (2023). Retrieved from Ubuntu: https://ubuntu.com/ Peppermint OS . (2023, July 1). Retrieved from peppermint: https://peppermintos.com/guide/downloading/ The Operating System . (2023, September 17). Retrieved from debian: https://www.debian.org/ Page 9 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help