performance lab report 1

docx

School

Strayer University, Washington *

*We aren’t endorsed by this school

Course

505

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

3

Uploaded by DeanBatMaster862

Report
Performance Lab Report 1 Template Due in Week 2 Strayer University CIS502 Theories of Security Management [Performance Lab Report 1] Submitted by: [Tolulope Lawal] [1/16/2023] 1
Performance Lab Report 1 Template Due in Week 2 Instructions: Column 1 provides the lab number, title, and a brief description of the lab. In Column 2 you will summarize in three to five sentences the key lessons you learned from completing the lab. Lab Key Lessons Learned (No more than 3 to 5 sentences) CHAPTER 2 2.1.1 Encrypting Files with EFS In this lab, you will encrypt files with encryption file systems (EFS). This process encrypts the files to protect them from unauthorized access or attack. Completing Lab 2.1.1, Encrypting Files with EFS, demonstrated the location of where this setting is located and knowing which setting preferences to choose to enable this encryption. It showed how to apply the changes so that the file was successfully encrypted. It showed the process in how to take an easy step towards keeping information safe and limit access to only individuals granted that access CHAPTER 3 3.1.1 Conducting Vulnerability Scanning Using Nessus In this lab, you will conduct vulnerability scanning using Nessus. Nessus is a vulnerability scanning tool widely used due to its GUI mode. Nessus can scan for a default password, a weak password, missing patches or updates, DOS, and so on. Completing Lab 3.1.1, Conducting Vulnerability Scanning Using Nessus, demonstrated the usefulness of being able to show the vulnerabilities in a target network. Nessus was easy to use and apply; all you had to do was input the target machine, allow it time to properly scan the computer, and get a detailed analysis of the various levels of severity issues. 3.2.1 Installing Antivirus In this lab, you will install antivirus software. Antivirus software detects, prevents, and removes viruses, worms, and other malware from a computer. Completing Lab 3.2.1, Installing Antivirus, demonstrated how to install the necessary software to safeguard your computer system. The antivirus installation process was designed to be simple and to provide options in addition to the antivirus that was intended. Once built, it offers simple access to do a diagnosis of the system's current state. 2
Performance Lab Report 1 Template Due in Week 2 Lab Key Lessons Learned (No more than 3 to 5 sentences) 3.6.1 Using Social Engineering Techniques to Plan an Attack In this lab, you will use social engineering techniques to plan an attack. Social engineering is a technique to gather information about the target. This information can then be used for financial gain or to access systems, networks, or physical locations. Completing Lab 3.6.1, Using Social Engineering Techniques to Plan an Attack, demonstrated the necessary details to illustrate how information is tracked and gathered for the attackers' use. The necessary keystrokes to acquire further information for personal use, financial gain, or system access had been captured through the terminal window. 3.6.2 Configuring a VPN In this lab, you will configure a virtual private network (VPN). A VPN is a network connection process that creates a safe and encrypted connection over a less secure network, such as the public Internet. Completing Lab 3.6.2, Configuring VPN, demonstrated the importance of network security and how to use the settings window to navigate through and set up a new VPN. It is important to be able to create one's own virtual private network, even though it only requires a few easy steps (VPN). Being able to keep a secure connection to the competing, frequently used public choices 0 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help