LANPrac5_20_

docx

School

Western Sydney University *

*We aren’t endorsed by this school

Course

2013

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

12

Uploaded by TeGelas

Report
COMP2013 LAN Workshop Practical 5 - Solutions Page 1 of 12 COMP2013 LAN Workshop Practical 5 Network Threats, Security and Prevention Student Name: Student ID: Practical Class: Instructions to students - Attempt all questions This Practical may contribute to your final assessment mark The Tutor can check your solutions when you are finished
COMP2013 LAN Workshop Practical 5 - Solutions Page 2 of 12 Part A – Network Security A1) What types of data is considered to be sensitive by businesses and should be protected? Sensitive information is data that must be lock from unauthorizes access and unwarranted to maintain the information security if an individual or organization. Sensitive business information is any data that would pose a rick to the company if released to a competitor or public. Information business that poses a rick to the company such ad trade secrets, plans, financial data, customer information, supplier, and etc. A2) A good Username and Password policy should include what four things? (i) Never use the same password between work and home (ii) Never reuse the same password (iii) Change password frequently (iv) Password should be at least 8 characters long contain upper letter and lower letter, as well as number and some special characters ($@!%&). A3) What is needed and required on all the incoming gateways to protect a network from unwanted access? A firewall is software or firmware that prevents unauthorized access to a network. It inspects incoming and outgoing traffic using a set of rules to identify and block treats. A4) If TCP/IP services are run on a NOS connected to the Internet, what are some of the potentials involved? The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to denial of service. Software to carry out most of there attack is freely available on the internets. There vulnerabilities unless carefully controlled can place the use of the internet or internet at considerable risk. A5) List the properties of the following threats: (i) Virus: A software or computer program that connect itself to another software or computer program to harm computer system. Virus is a Type of malicious software, or malware, that spreads between computers and causes damage to data and software. Virus aim to disrupt systems, cause operational issues and result in data loss and leakage. (ii) Worm: Replicate itself to cause slow down the computer system. Worm is a type of malware or malicious software that can replicate rapidly and spread across devices within a network. Worms can also change and delete files or introduce to other malware. (iii) Trojan: Replicate capture some important information about a computer system or a computer network. Trojan is designed to damage, disrupt, steal or in general inflict some other harmful action on your data or network. (iv) A6) What is a teardrop attack? How does it affect a computer system? Teardrop attack is a type of denial of service (DoS) attack that attempts to make a computer resource unavailable by flooding a network or server with request and data. Teardrop going to sending fragmented packets to a target machine. Since the machine receiving a lot of packet cannot reassemble them due to a bug in TCP/IP
COMP2013 LAN Workshop Practical 5 - Solutions Page 3 of 12 fragmentation reassembly the packets overlap with another and become crashing to the target network device. A7) What does the Smurf attack rely on to execute itself? A smurf attack is a form of DoS attack that causes packet flood on the victim by exploiting/abusing IMCP protocol. When deployed, large packets are created using spoofing. A8) When a network attack comes from a coordinated group of hosts what kind of attack is this? A distributed denial of service attack occurs when multiple machines are operating together to attack one target. DDos attackers often leverage the use of a botnet, a group og hijacked internet connected to devices to carry out large scale attack A9) How does public/private encryption work? Public Key: method of encryption or signing data with 2 different keys and making another of the keys, the public key, available for anyone to use. Private Key: uses the same key to encrypt and decrypt the data. A10) Why was the IP Security (IPsec) protocol developed and what are the three protocols that IPSec implement? (i)Authentication Header (AH): Protocol data origin authentication, data integrity, and replay protection. (ii)Encapsulating Security Payload (ESP): A member of the Internet Protocol Security (IPsec) set of protocols that encrypt and authenticate the packets of data between computers using a Virtual Private Network (VPN). (iii)Internet Key Exchange (IKE): the protocol used to set up a security association (SA) in the IPsec protocol suite. A11) What are several common matching criteria for IP packets used in an Access Control List of Packet Filtering Firewalls? Source address: IP packet that can be filtered based on address located in the IP Header of the packet. Protocol: IP packet that can be filtered based on protocol in IP Headers of the packet. Destination address: IP packet that can be filtered based on the destination address located in the IP header of the packet. Source port: IP packet in TCP or UDP the packet can be filtered based on the source port in the TCP/UDP header of the data portion of the packet. Destination port: IP packet TCP or UDP the packet can be filtered based on the destination port in the TCP/UDP header of the data portion of packet.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
COMP2013 LAN Workshop Practical 5 - Solutions Page 4 of 12 Part B – Creating User Accounts in Windows 10 B1) Log in as an administrator on virtual machine Windows 10 and create the following two users : User named “LocalUser1”. For the password, use a strong password (you may use the same password for the other user as well). User named “LocalUser2”. The steps of creating users are as given in B6 (Steps 1-5) of Practical 4 . Test the user accounts by switching user and then logging back using the usernames you created. Did the user accounts work properly? Part C: Sharing Folders in Microsoft Windows 10 C1) Simple file sharing is used in Windows 10 to share file/folder with other users in the same work group. Follow the steps below to create shared files using Simple File Sharing in Windows 10. Make sure you are logged in as the Administrator User. Step 1: Turning on Simple File Sharing. Click Start 🡺 Windows System 🡺 Control Panel 🡺 View network status and tasks (under Network and Internet ) to open Network and Sharing Center . Click on Change advanced sharing settings Under File and printer sharing select Turn on file and printer sharing ( if not being selected yet ) . Leave all other unchanged and click Save changes . Step 2: Creating the shared folders · Create a folder SharedFiles under C: , and create a text file in SharedFiles. · Right click SharedFiles , select Share with and click on Specific people . . Add LocalUser1 with read permission (default) and LocalUser2 with read/write permission. . Click Share (select Yes, turn network discovery… ) and then Done . Step 3: Log on as a user and test access to the folder SharedFiles · Switch user and log in to Windows 10 as LocalUser1 that you created earlier. Can User LocalUser1 read, modify or create files within the Shared Files folder, why/why not?
COMP2013 LAN Workshop Practical 5 - Solutions Page 5 of 12 Step 4: Log on as a different user and test the access to the SharedFiles Folder Switch user and log in to Windows 10 as LocalUser2 that you created earlier. Can User LocalUser2 read, modify or create files within the Shared Files folder, why/why not?
COMP2013 LAN Workshop Practical 5 - Solutions Page 6 of 12 Part D: Assigning file/folder permissions in Microsoft Windows 10 D1 F o ll o w the steps below to assign permissions to shared files in Windows 10. Make sure you are logged in as the Administrator User. Step 1: Sign in as User (Administrator) and c reate folders C:\SCDMS, C:\SCDMS\Research and C:\SCDMS\Computing\Teaching and check the permissions to Users Group for all the folders and the SharedFiles you created earlier. Can you explain these default settings? Step 2: A ssign p ermissions to the folders based on the following table for Users and Groups (right click the folder and select Properties 🡺 Security and then choose a user or group of users and select Edit ). Folder Name and Path Group or User Permissions C:\SCDMS Users Group Read & Execute Administrators Group Full Control C:\SCDMS\Research Users Group Read & Execute Administrators Group Full Control C:\SCDMS\Computing\Teaching Users Group Read & Execute Administrators Group Full Control LocalUser2 Modify Log on as “ LocalUser1” and navigate to the “ C: \ SC DMS \ Com puti ng \ Te achi ng folder. Try to create a file in the Teaching folder. Could you create this file? Why/Why not? Switch user and log back on as LocalUser2”, then navigate to the C: \ SC D MS \ Co mput in g \ Teac hing folder. Try to create a file in the Teaching folder. Could you create this file? Why/Why not? Switch user and log back on as Administrator” , then navigate to the C: \ SC DMS \ Res earc h folder. Try to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
COMP2013 LAN Workshop Practical 5 - Solutions Page 7 of 12 create a file in the Research folder. C ould you create this file? Why/Why not? Switch user and log back on as “ LocalUser1”, then navigate to the C: \ SC D MS \ Resea rch folder. Try to create a file in the Research folder. Could you create this file? Why/Why not? Switch user and log back on as “ LocalUser2”, then navigate to the C: \ SC DMS \ Resear ch folder. Try to create a file in the Research folder. Could you create this file? Why/Why not? D2) Permissions to a subfolder is determined by the property setting of Sharing and Security , as well as the inheritance from its parent folder. How to check the final actual permission to a folder? Check the final resultant permission for each of the folders you created. Are they the same as you expected? Explain what you have observed. Follow the steps given below to find out the final actual access:
COMP2013 LAN Workshop Practical 5 - Solutions Page 8 of 12 1. Login as the Administrator 2. Open Windows Explorer, and then locate the file or folder for which you want to view effective permissions. 3. Right-click the file or folder, click Properties, and then click the Security tab. 4. Click Advanced, click the Effective Permissions tab, and then click Select a user. 5. Enter the name of a user or group, and then click OK (you can also click Advanced and then Find Now to select a user or a group from the list). Click the button View effective access. The selected check boxes indicate the effective permissions of the user or group for that file or folder.
COMP2013 LAN Workshop Practical 5 - Solutions Page 9 of 12 Part E: Using the Encrypted File System (EFS) E1) Follow the instructions below to encrypt a Folder using the Encrypted File System (EFS) for the User LocalUser1 1. Log off the current users from Windows 10 and Logon as LocalUser1 2. Create the following new folder C : \ E ncry pted File s 3. Right-click the C:\EncryptedFiles folder and click Properties 4. In the Properties dialog box, click Advanced 5. To encrypt the folder, make sure the Encrypt contents to secure data checkbox is selected, then click OK 6. Create a new text document in the C:\EncryptedFiles folder called User1File 7. Logoff LocalUser1 and Logon as LocalUser2 and create a new text file called User2File in the C:\EncryptedFiles folder Is the User LocalUser2 able to view or edit the file User1File and the User LocalUser1 able to view or edit the file U ser2 File , Why/Why not? Is it possible to Compress the contents of an EFS Encrypted Folder using Mic roso f t s built in Folder/File compression? E2) Which file system supports EFS? If a file that was encrypted using EFS within Windows 10 is copied or moved by the user who encrypted the file to a USB disk or another file system other than NTFS such as FAT32, is the file still encrypted on the new file system? why/why not? E3) Is it possible in Windows 10 to allow other users the ability to view/edit the contents of an encrypted file? If yes, provide the access to the Encrypted File between LocalUser 1 & 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
COMP2013 LAN Workshop Practical 5 - Solutions Page 10 of 12 Assume that LocalUser2 is still login. Right click on User2File, select Properties 🡺 Advanced… 🡺 Details 🡺 A dd and select the Certificate (LocalUser 1), and click OK (a number of times). Logoff and login as LocalUser1 to check the access to the encrypted file User2File. LocalUer1 can also repeat the above procedures to given LocalUser2 the access to User1File. The access to the encrypted files in Windows 11 can be set similarly. E4) Is it possible in Windows 10 to allow the Administrator to view/edit the contents of an encrypted fi les of other users directly?
COMP2013 LAN Workshop Practical 5 - Solutions Page 11 of 12 Part F: Alternative Data Streams Follow the steps to hide and then display a text file (you can do this with either Windows 10 or Windows 11). 1) Create a subfolder c:\hide by: c:\>md hide 2) Create a hidden file in the subfolder by: c:\>echo You can’t see me.>hide:hidden.txt 3) Check contents of the subfolder: c:\> dir c:\hide (no files found) 4) Display the hidden file by: c:\>notepad hide:hidden.txt
COMP2013 LAN Workshop Practical 5 - Solutions Page 12 of 12 Part F: Using a password cracker Try our hand at using a password cracker by following these instructions: 1) From the Workshop folder of unit website download the file 2022LAN Workshop.xlsx to a known location, say a subfolder on your U drive (that is mapped to your virtual machines in last week exercises). This file is password protected. 2) Go the Passware Kit for Excel Web site at http://www.lostpassword.com/excel.htm to download the free demo and install the software to a known location on your hard drive (the virtual machine Windows 10 or 11). 3) Run the program and click Recover File Password (Ctrl o) in the Kit Windows to crack the password 4) Choose 2022LAN Workshop.xlsx (you may also prepare an Excel worksheet with password protection to test the software) 5) Select Run Wizard . Choose Non dictionary, but similar to an English word . Click tab Length & Casing , set 3-4 as password length, select High for Xieve level, and click RECOVERY . 6) Try different files and different attack strategies
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help