0% found this document useful (0 votes)
41 views38 pages

Nis Practical

The document provides a series of instructions and practical exercises related to IT security, including software installation, system updates, data backup, and password management. It also covers encryption techniques such as the Caesar cipher and SHA-256 hashing. The content emphasizes the importance of data protection and security measures for computer systems.

Uploaded by

shindenanadu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
41 views38 pages

Nis Practical

The document provides a series of instructions and practical exercises related to IT security, including software installation, system updates, data backup, and password management. It also covers encryption techniques such as the Caesar cipher and SHA-256 hashing. The content emphasizes the importance of data protection and security measures for computer systems.

Uploaded by

shindenanadu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 38
Pageno.() Jp SHS Iba B Date : JRA RR AR I AR RR RE Soflmaxe on Sy Siem .C b- Sed -u opencalir 4 av oe: Tnstall and Canfigurse, pip Antiviau ystem _Upelates. aK: b any) Cnstal) Apliviaus softvrre on wingaws 10 Slepo: Tn aly the Anviou stepa-+ ‘Activake the Sofware. flare» depd: Configure the safle sed SSIES IORI IC IOI IIR EB BBB ing. Sheps: Slaxt th can * # steps: Update th ofan = b| dep7: Maite the Soflunve _ penstormane, ¥% Conclision z is an essenticul payt or keeping vauy clevice z Secuxe and pralerter . * * * z t sok sees e SEER RE ( JRE aaa (GovinDs’ e Date > 20 IAA AAAI IAA HAA A AANA AAAI IAI, SEE z ; % pockup > Adda Drive, cind- then chanse an z edeonal deive cor neluwwoxk Jocetinn for your % backups z x Restore —vour Liles with File History. z In the secrch bax an the taskhaw, Lype: % “reslaxe Files £ ‘Then_select Restaxe youre files mith Ble hi dea % 2look fox the Gle that you need. then use the cms +o see all its verscinns. 3-bShen you find the verrsinn thal you Mant Selec) Reshowe yn save it in ip location - Ta Save id {na cliffersen} place HOSMER HEHE ERE Be Be be % a & = ight Click Resiove, Selecl Reshaye ‘+0, anel then # Choose anew) Inerition. * x G ecu}. , . $—Of windauis # tn + se i % tonel_1 Select Contral pane! System anal Ssécliatty > * Backup a nd Resloxe (windows Dp. £ 3% eae BCI Sk sk sR aka Deak kak ak kok HAA EAT Conclusion s Tk helps expemtenced IT Suppor} provides thet prauides:- dat and vétcoversy Staategies . Ensuve * backups and thet an in place: 40 to have an leary aya dowd backup ave “done | Prequel) Cp PTO Prick oSHreubegy vat Sng eStore deta ag.$e i ea Date: Co GEER III TRS a Sse kok ik sesso akeeae passmarls ta apencatin.g ystem lh Seo RR and" infexmation axe: pratected i: terphs ta —Joq an th the campiene . ge ing Pex wooncel on the computer iS _impoxdan | E B B (d I pe ysiem and 1s ane of the safest way paotecl nuxself cit hame ny schoal_ ox in 4 5 SI SER SIR HERR RI HR EARN AR RR BR i Step &- Determine which Operating SySlem au Computer’: sauoning if you don't Cbs eady now « Same. _versSians at ar 42m have siiqhtly different methads of selling passenoxds fey the ae Pr Slep2s pen the apennling ayetens's sey Account ¢ logon authenticction . Tr Using a ANAS TS TRNAS AS AS AS AS TR TR AS AR TR AS AS AS AS AS AS AS IS AS TS TS AS AS TS AS AS AS TS TS TB TS TS TS TS TB IS TS TAB TS TS AS I p Click dhe" User Account " ican in the. cantynl pdnel- TP f sing Othe oprating system Versinn 10.2 ny later. tbe f taaccound fan Usually he npenecl by Clicking on g —Bcceunis OREO BEER be tok in the tyetem preferences hax Lfaom nbake Plea menu. RR Peony JSS aE GovinDs: aK ST eek Ge | ( ) Leaps ook ea eae ( Date : DR RK ee step 3s z i 0 account} on the £ as" Admini ¥ sy bem. Click ance. on the user Account's num Eon i idan to # dhe user! b RS 4 R p Ncreate ap ia! Ie BR ea password" ", “view alist’ of aroma thi options far How to Crveate i need CPP passaersel crake a ned app password far cnape or # device . take the Follawaing steps. Syste RE se changing. Account ana‘ Pac. opennting * © version lo.2 or later; Click on the user name the" Accounts” box. PB HE HA A A RIOR j @ 4 sel the passed far the Computer tn w ii . : = option passwoerd cond Clic Passuanrd change password on Rese} AA. he Secusity basics page 4 sign-in to your — Micansoftcecounh More Secuaity ophions. # Under _App_pascwends, select “Create <1 neal_ApP tig aR Fn WS Gan EE # -Passax * # your forme Jaen Samat A hacsenan SHARK ( Y—O) Shauld be Labelle SSR RR a RE * RR: ence_you_caoulrd <0 z in ce ctpp li iiealie HaSeSEe ieee Condlusion ¢- Tony — euethenticalion Scheme 5 dépend an secye} PASSWord Ss. - Tn * contrast , hardware Constan improves, givin attackers Oe increasin g Computationays Potwen Date: ) RSI IAAI SSSI I SR eae Practical Np 2 4- F ppply secui y to file folder ow cipplication using—ACLESS _penmissionS and werify- F 1 gighl_clicle the folder oy file and Click.“ propendies" jo the. fonte: mMenu- elect the security Jah . Click €aik aie ee add..- ~In the €ntery the object names ta select tex} ox, 4NPe the name of the uy OF g2auj9 thet ail) have access to the folder. be 1 i SEE ae: coe see ie - a - * < < * e e bine bP ick Ok. the _peamissians -cliclay bax p reappears. &-In the botip oy uséy name Seclian, Selec ze the You wish to se} “PESMISSiaNs Fax i: Te _the permissian section .USY the Jo“ Selec! the Appropricde, permission leve) jo-Clicle Apply NAc Akay * ~ a * * * * x om Lo *~ * * % * The new _persmj file ox alder. ONS ore added tothe ok % * ¥ % 2 * * ¥ : : 7—_ ; Sse FAR eek kee ff I SR RR AA IR RA a SFA | Drees epee Cota9g AR rok Js aaa oni 5 er | | | ato Betoeeerasnesan yesebiebdeisiaaiat _ Praclical_No-2-4-—_ - aa __Apply security toil € foldléa_exx_aapplicakion— “using_actéss _peamissions and —veaif-——__— apply Secumity to file faldén __________—_ 4 Right clicle the folder ov file and_click.” prepeaties" Se be {The _peamissian dliclag_be; prcappeans. | fe okSHe SRS RHR RR Hee lees ae vnas € * Jo-Clicle Apply “Ft Click Okay The _new_penmissians ane added 40 the _ & file ox Faldew. = x * peamissions 4 ven} * ae A * * * * * * £ pe nak a kk kek aka Jblsaaaieiaiaietektoeea: Coa Point ) Date: No. ( — DR A eR eR A ARE Pacichical NO+-5 Waite _c__pragram tn implemen} Caesar SRR ae Alphabet. the numerals 0 thaaugh _4- #indludé < bits /sideteeh> pe pe pe ae se ie = : = Using Mamespace—std ? * 4 = x z ¥ * FERIA IISA SII TSI IACI IRI CR SR oR oR etek ok dead ae eat ae Slring_encxypt (string inp. int key) fo Laat te Dj icine -Size (05 itt) if Cis digit Cinp lit) inpfit= Cchaw) (Cé int) inplil- 484 key)%Z lo +485 else if Cis Slewers inp ti) inp Lid= (cher) ((Cink) jp [11-97 + key) 424 +42); § —1E Cis digit (inp Ci 'OP Ci] =(Chay)(Cink IDPLIJ-#8 ~Key+ 10) % lo + 48)3 JSR H Sapa ieek ane 2k CoS ( ieee 9 ny Date Skea RR A HER ake ok ak oe te ate RRR “ise seat Cine) —__—_ : —inpCil Sie eee Pe joa fo : dying inp; int key + int nj Cin syn; Switth_¢n) § Cases: eee ene eee OP -EncayPhed $exd Prd en ek SOCCER CEE las He 2 pradfsn 5 . oudpul: Dencvypled texb Kalyani Conclusion # -ry hts avdiclt; we, dl Cha messag (overred the Caesar cipher. we Lee leayney | —Messagelr2 how 40 Cipher ¢ detiphery message aa cee set. Che 4 b | Shifting Iks leHers by a given off | not) SpE PESOS - practical Norge “Waite Q__ program to implement Verne. uyani _ Cipher. a #eincudec s\dio-hy Ht incude 2 clype-hy Be Tieye 2 (8); eT Mtg We g —ChaY message [22], keyCor}emessage (221 red let tearney fe message Cry, nésscig € by en off “paint C'\n foley the Keyes __# ~fyels (leey , Sizeaf Ckey)_, sidin)s __# Beesiesscnesises, JERSE RIE eR: a: Joene( ate SSI I IR RR Reese ok ok PRA A AAA A A AAA AAS _llEnexsyplion _ a for i=05 keylill= \0' ¢¢ message Cid 20’; MeL Le& ae ska keokeskeak ae okeok ak testes se ateokee ake ok teak, fox (iz 0} i226 itt) bcd Qn om visita 1 Coss velurn fj z an ASU characloy ial fiedgolumn Cchay ¢ i int eric oi tz2¢; iat) § if Cr Ci] fodsec) —Telurn, ip Nal_found JPR IE teak tee i JRE OSES OG A Ho i | i i : : = prio( —) SSIS eR Rob ok kok tk importa java math - Big] | import.java nia chasse —impont-java-seeusity - —impavt- # indlude ‘ Noid_enexyphfisg Char engl, ink key) 2 int_msglen= Sten (ms), i jy ke L200 =), Co) =O; that sail Patatz key} Consqle ni; fox li=0; ickey;++i) Fer '=0; jc salen; +4) FallMadixG IC] ="\n': PailMadzix FroeI Lol eels msgCi Tj if Crou) = = afl -xeea = =key-1) keke (<1); a He o RAT RAH AAR JP SSeS ib tek: * * * * * * * oe ‘ : foxlizo; iz msglenj ++i 5 * * & cas haa. ennai) key) ten COGS lel teens «Ckey}[imeghen] age No. ( ) Je Ee Conelusion The Rail Pence ld evith is Some Capegaphy nf) ie Pentti. ng} SECUYE Lungage. Stay HAA AI AAA AHA AAI a Jee # Decryplion del decrypiliessage (cipher): meg A tn k lodices ke tad* = 0 # dyacle ms4- ind« anne foX - in tang é (col)? ame curr: idx = key . index (hey-Jst [tk ) fox {in ange (rows)? dec. Cipher LjI Cour: idx] = msg 59 indx += 1 FOREN AEH HEHE )e nen ERR REE ZS SORE HEHE GOGH EEE EES EI BOIS GOO On nr i nienionce : 5 : = ‘ at : 5 : : 4 we a SEE one ) pee Page No. ( ieee terete Page No. ( ) 7 Heehehiihaddeiaia AROSE OREO ER RHEE es indepen: +e: (Sum (dee Ciphew, £1) aaise aC This_p cannot") ae “hed ly nods.) 159 = Coun, ieee Eee —if_oull-Countsp: stetuan sq f: - null a a er LV CLIT LL tte ir FIA I IAI I I TI III IIIA II AA A DAA AOI AISI AAA A A A ypled Pessage ? § 2! = se Cepia > E| i Se era then_zéading the ciphertex! of ¢ —_iqn_ a . Jumn < . oO FEO EO HEHE OOF RCE. : AO EE IEE K( JHA ee HHEE eine ‘ : : : e # tool _Ce-9-Cayptoal) : ce —and verify digital | Conelusinn t= The Digi siqnadure —crve the simple —corypiaol Tis eocify of the digital i uve. 2 Meee Heir I IO a JiR Here REE ES Cpungeroe * : * : : : rr : : + * * * : +ee * + * EERE REE Re eeeeeeee i SeEHEEH ENERO HERON \ekeenneenonnennnen Practical No +1 * Use Sleganaqaaphy to eaeel encode and * decode the message. using any _taal- : —Thé—ismad_Steqanagaaphy is derrived {20m * fino _bineek oords . “Shegas,' meaning ‘40 : and gaayfia', meaning wailing’ .thus i i ‘hidden “Uailing ; & Steganography is _a_ methad nf hiding ‘ data. hy embedding 14 inta an audio, video, — $ do “Covered Waiting’ on employed to protect secre from _omuiciaus citlacks COT Iame. TEA Tene syplion Algonxith HEI I I I I I I ( dinagé oy ted fe. 1} is one af the methods —Sieqo- image or sensitive dada { JHB BOG RRO S ‘ a a 2 cll _fjxet) ; : = * : s : : 3 eee : Es = : 2 =n * eRe FAR ORO IOR( Jet Re page No. ( ) Ben tthe enon: Da —Prnclica) nas 19. eevnenneenennnnenn —Fxecna| iF N—ANY _APpemaling System Sep L: Securte uy Liredall hepa: Pachiler ae fizesvall and IP. Zanes. : Con gue access Coola) lis ancl lagging. EN Ie & S_Tes) your fiaemall Confiquaction bl Configu: me. Siveurall sem, —bpeaciting ac Hee Dfiquaing a fxewall invalves various Components = from _haadawye and safimare te _clocumentatinn and awies- that aro Jo cxende, a xobust security : * * ‘ * * * * c . ; E —. ofiquae. Your _othea fireaiall Services * * * ; * * * * : * * : * : E F | | . * * * * * * * * * * * * * a free my —Signadinee_hubtan forse signing : age No. ( ) ae “<= peo tie i eee = a P2QACIica) Np + Terre rer eee oe tl eg cayping yy Se Cette, 1 After eee s : ie ee OD —— et UY oie a Sides Login ax * ule a ee he one, § : ue #£4_sernnds. as : eee d—Slorage Corspatihility itp —fuickly uplaad the needed dar ~Clauds with alenast any ; ; : $ Gam_prefenced device. it : ; pADee texual contend place i include ¢ : : * * * = * * * * * * * * * * * * * * * * * * * * * * * * * * * * + * * + * . * dude. signi he_sigcing equine ta ane ov several recipienis a ere Hay a TOE KER eH EGER a No. ( ) rite Z:. * eee eg, | 2Opely the pay -buddor ae 0. eso teal ine t B R (eens generated en aller su hash vedic | b i] Mee nen eens ; aero N—finished to Teaiby digital signals eS soe fly 4e0tciog Reyes eccnal—ina 2 ended YS meal | pan? FEE * * eee, Bee tees. eroail onl zs he Date Raachicg) orig Meanes a Ackea Pa) —the_entive, email hat len} coil he vis; ble. reece CAS indow € You Will be aequived to fee bea aye ) OBER HERE ° ) te page No. ( Date SEISIIOB OR A A a ee a x * ‘ : $2tiold down the ‘chal ' bitin nur keybaard % $4 then parss the ~c' kew ance. this hac z ¥ copied the highlighted headers. : $= on! the _heade have heen paste, = ¢ Glick ithe * Trace’ butlan in initiate {he * = —hace. : * 3 a gclllistantes the saute to lake ta luare mal * * $-emailheadee tohils! in the [ie Tah na thon x ¥ ty race Repavis tion and Click the Fra : ; ; foiitadems option, —_______* : * * : The email trace dinteg wil) nppenrras Shaun * F above These are two aplinns rahe L - # an_email. brace nn mail T have receive = : : * * s * * * : 7% z * ry : $ Headeres. * ; a ae * :—— * $ Conclusion: one method | * Fa: ff an—emall is _by anal * § addvess —in formation _ A x ’ headers. BE ap ¥ , * Seen eneeneneeeeeney : eee WAPN Ss sneasecavint => Oe en oT Fe: a page No. ( #ifmd ond press Qiey tn 2PED_A Command * Eke the Jalieising sleps 4 40a a feraicexoude By pc“ns.; a —_______ _ ~Lithe _spalligh! tenn 4 ican in the TMenu | hor Note elf ) geenrteeneeseesesnes, Mensensennsenesene —__p- eee -Noi15 ace the ee eet _galacal (TP) packet | aR to_its destination tram Sauce. Fracent deleamine ihe Seen toa Besledlen. IL Sending Tnlewnel Coolaal Message ee eee 4o the a | —Sleps te in a_taacex a allindews key +R fo open ee Run -toindaas. R The—icon looks like A—magnikying glass 4 fhler Nelmenk Ulilily jaca the spailignb ebeetLLEee tee et OOOH ERR EEE No. ( ) SEO am I Date : OO II * * * cs * . * * * * vie * * * * * . . * * 2 * * - . = “3 sh: * a * * pbekaeen Your computer anda sperifiod x Detwoxk and the Tnlenme}. * * : : aoe $ hop Thi Uiility helps you find where high 2 ; ; ; + * + * * —Netudovks Sei CS prypviclerr * OR I II OK( a a i aie i ei ai a a * * * * * * * * * + * * + * * + + * + * + * IOI ARR KO IO I I IAAI AAAS AIA I A III AIA A A IAS AHI IN AN AA AA ACA AA A No. ( ) Brett este tesensy Date : i Nee Renn FOO OO IK vi to ¢antinue) ¢ Click pjoxt. Cor@nite FIFI IO OO TIO: Biiscccsskeceeseen( OEIC I ISI IOI He: No. ( ) HH HE He ak wee CK, ' ’ ‘ ' : a ¥ * * = * De * : 9 g HE i * * - * : * * 2 * * SORE se Fiz” Code. FTp Login -E Tp Passunval $ nn the Encryption key Sectinn . Click Porniee. Eh t t Set_during the exported in siep 4 oF jhic Micle - FIO OI OI OI III A A A At AA ) 9 I RHE A IE A ee WS eee Dat ws at ee RH RH “aill he thé Blaarbera xotocol_. SE TP ——______ = . i. ei he fle, 12 dowloaded Eitan + ) M000 S*seuseesenes te RR * * * * * * * * * * * * * * * * * * - + * * * * * * * * * * * * * * * * * * * *

You might also like