0 ratings 0% found this document useful (0 votes) 41 views 38 pages Nis Practical
The document provides a series of instructions and practical exercises related to IT security, including software installation, system updates, data backup, and password management. It also covers encryption techniques such as the Caesar cipher and SHA-256 hashing. The content emphasizes the importance of data protection and security measures for computer systems.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save Nis practical For Later Pageno.()
Jp SHS Iba B
Date :
JRA RR AR I AR RR RE
Soflmaxe on Sy Siem .C
b- Sed -u opencalir 4 av
oe: Tnstall and Canfigurse, pip Antiviau
ystem _Upelates.
aK:
b
any)
Cnstal) Apliviaus softvrre on wingaws 10
Slepo: Tn aly the Anviou
stepa-+ ‘Activake the Sofware.
flare»
depd: Configure the safle sed
SSIES IORI IC IOI IIR EB BBB
ing.
Sheps: Slaxt th can
*
# steps: Update th ofan
=
b| dep7: Maite the Soflunve _ penstormane,
¥% Conclision
z is an essenticul payt or keeping vauy clevice
z Secuxe and pralerter .
*
*
*
z t
sok sees e
SEER RE ( JRE aaa (GovinDs’
eDate >
20 IAA AAAI IAA HAA A AANA AAAI IAI,
SEE
z
; %
pockup > Adda Drive, cind- then chanse an z
edeonal deive cor neluwwoxk Jocetinn for your %
backups z
x
Restore —vour Liles with File History. z
In the secrch bax an the taskhaw, Lype: %
“reslaxe Files £
‘Then_select Restaxe youre files mith Ble hi dea %
2look fox the Gle that you need. then use the
cms +o see all its verscinns.
3-bShen you find the verrsinn thal you Mant
Selec) Reshowe yn save it in ip
location - Ta Save id
{na cliffersen} place
HOSMER HEHE ERE
Be
Be
be
%
a
&
= ight Click Resiove, Selecl Reshaye ‘+0, anel then
# Choose anew) Inerition.
*
x G ecu}. , .
$—Of windauis
# tn + se i
% tonel_1 Select Contral pane! System anal Ssécliatty >
* Backup a
nd Resloxe (windows Dp. £
3% eae
BCI Sk sk sR aka Deak kak ak kok HAA EATConclusion s Tk helps
expemtenced IT Suppor}
provides thet prauides:- dat
and vétcoversy Staategies .
Ensuve * backups
and thet an
in place: 40
to have an
leary aya dowd
backup
ave “done | Prequel)
Cp PTO Prick oSHreubegy vat Sng
eStore deta ag.$e iea
Date:
Co GEER III TRS a Sse kok ik sesso akeeae
passmarls ta apencatin.g ystem
lh
Seo RR
and" infexmation axe: pratected i:
terphs ta —Joq an th the campiene . ge ing
Pex wooncel on the computer iS _impoxdan |
E
B
B
(d
I
pe
ysiem and 1s ane of the safest way
paotecl nuxself cit hame ny schoal_ ox in 4
5
SI SER SIR HERR RI HR EARN AR RR BR
i
Step &- Determine which Operating SySlem au
Computer’: sauoning if you don't Cbs eady now «
Same. _versSians at ar 42m have siiqhtly
different methads of selling passenoxds fey the
ae
Pr
Slep2s pen the apennling ayetens's sey
Account ¢ logon authenticction . Tr Using a
ANAS TS TRNAS AS AS AS AS TR TR AS AR TR AS AS AS AS AS AS AS IS AS TS TS AS AS TS AS AS AS TS TS TB TS TS TS TS TB IS TS TAB TS TS AS I
p Click dhe" User Account " ican in the. cantynl pdnel- TP
f sing Othe oprating system Versinn 10.2 ny later. tbe
f taaccound fan Usually he npenecl by Clicking on
g —Bcceunis
OREO BEER be tok
in the tyetem preferences hax Lfaom nbake
Plea menu. RR
Peony JSS aE
GovinDs:aK ST eek Ge |
( )
Leaps ook ea eae (
Date :
DR RK ee
step 3s z
i
0 account} on the
£ as" Admini
¥ sy bem. Click ance. on the user Account's num
Eon i idan to
# dhe user!
b
RS
4
R
p
Ncreate ap
ia!
Ie
BR
ea password"
",
“view alist’ of
aroma thi
options far
How to Crveate i need CPP passaersel
crake a ned app password far cnape or
# device . take the Follawaing steps.
Syste
RE
se
changing.
Account ana‘ Pac. opennting *
© version lo.2 or later; Click on the user name
the" Accounts” box.
PB
HE HA A A RIOR
j
@ 4 sel the passed far the Computer
tn w ii
. : =
option passwoerd cond Clic
Passuanrd change password on Rese}
AA.
he Secusity basics page 4 sign-in to your —
Micansoftcecounh
More Secuaity ophions.
# Under _App_pascwends, select “Create <1 neal_ApP
tig aR Fn WS Gan EE
# -Passax
*
# your forme
Jaen
Samat A hacsenan
SHARK (
Y—O)
Shauld be Labelle
SSR RR a RE
*
RR:
ence_you_caoulrd <0 z
in ce ctpp li iiealie
HaSeSEe
ieeeCondlusion ¢-
Tony — euethenticalion Scheme 5
dépend an secye} PASSWord Ss. -
Tn * contrast , hardware Constan
improves, givin attackers Oe
increasin g Computationays PotwenDate:
)
RSI IAAI SSSI I SR eae
Practical Np 2 4-
F ppply secui y to file folder ow cipplication
using—ACLESS _penmissionS and werify-
F 1 gighl_clicle the folder oy file and Click.“ propendies"
jo the. fonte: mMenu-
elect the security Jah
. Click €aik
aie ee add..-
~In the €ntery the object names ta select tex}
ox, 4NPe the name of the uy OF g2auj9 thet ail)
have access to the folder.
be
1
i
SEE
ae:
coe
see
ie
-
a
-
*
<
<
*
e
e
bine bP
ick Ok.
the _peamissians -cliclay bax p reappears.
&-In the botip oy uséy name Seclian, Selec
ze the You wish to se} “PESMISSiaNs Fax
i: Te _the permissian section .USY the
Jo“ Selec! the Appropricde, permission
leve)
jo-Clicle Apply
NAc Akay
*
~
a
*
*
*
*
x
om
Lo
*~
*
*
%
*
The new _persmj
file ox alder.
ONS ore added tothe
ok
%
*
¥
%
2
*
*
¥
:
:
7—_
; Sse
FAR eek kee ff I SR RR AA IR RA
a SFA
| Drees
epee
Cota9g AR rok Js aaa
oni
5
er
|
|
|ato
Betoeeerasnesan yesebiebdeisiaaiat
_ Praclical_No-2-4-—_ - aa
__Apply security toil € foldléa_exx_aapplicakion—
“using_actéss _peamissions and —veaif-——__—
apply Secumity to file faldén __________—_
4 Right clicle the folder ov file and_click.” prepeaties"
Se
be
{The _peamissian dliclag_be; prcappeans.
|
fe okSHe SRS RHR RR
Hee lees ae vnas €
*
Jo-Clicle Apply
“Ft Click Okay
The _new_penmissians ane added 40 the _ &
file ox Faldew. =
x
*
peamissions 4 ven}
*
ae
A
*
*
*
*
*
*
£
pe nak a kk kek aka Jblsaaaieiaiaietektoeea:
Coa
Point) Date:
No. (
— DR A eR eR A ARE
Pacichical NO+-5
Waite _c__pragram tn implemen} Caesar
SRR ae
Alphabet. the numerals 0 thaaugh _4-
#indludé < bits /sideteeh>
pe
pe
pe
ae
se
ie
= :
= Using Mamespace—std ?
* 4
=
x
z
¥
*
FERIA IISA SII TSI IACI IRI CR SR oR oR etek ok dead ae eat ae
Slring_encxypt (string inp. int key)
fo Laat te Dj icine -Size (05 itt)
if Cis digit Cinp lit)
inpfit= Cchaw) (Cé int) inplil- 484 key)%Z lo +485
else if Cis Slewers inp ti)
inp Lid= (cher) ((Cink) jp [11-97 + key) 424 +42);
§ —1E Cis digit (inp Ci
'OP Ci] =(Chay)(Cink IDPLIJ-#8 ~Key+ 10) % lo + 48)3
JSR H Sapa ieek ane 2k
CoS ( ieee 9ny Date
Skea RR A HER ake ok ak oe te ate RRR
“ise seat Cine) —__—_ :
—inpCil Sie eee
Pe
joa
fo
:
dying inp; int key +
int nj Cin syn;
Switth_¢n) §
Cases:
eee ene eee
OP -EncayPhed $exd Prd en
ek SOCCER CEE las
He2
pradfsn
5 .
oudpul: Dencvypled texb Kalyani
Conclusion # -ry hts avdiclt; we, dl Cha messag
(overred the Caesar cipher. we Lee leayney | —Messagelr2
how 40 Cipher ¢ detiphery message aa cee
set.
Che 4 b |
Shifting Iks leHers by a given off |not)
SpE PESOS -
practical Norge
“Waite Q__ program to implement Verne.
uyani _ Cipher. a
#eincudec s\dio-hy
Ht incude 2 clype-hy
Be Tieye 2 (8); eT
Mtg We g —ChaY message [22], keyCor}emessage (221 red
let tearney fe message Cry,
nésscig € by
en off
“paint C'\n foley the Keyes __#
~fyels (leey , Sizeaf Ckey)_, sidin)s __#
Beesiesscnesises,
JERSE RIE
eR: a:Joene( ate
SSI I IR RR Reese ok ok PRA A AAA A A AAA AAS
_llEnexsyplion _ a
for i=05 keylill= \0' ¢¢ message Cid 20’;
MeL Le&
ae
ska keokeskeak ae okeok ak testes se ateokee ake ok teak,
fox (iz 0} i226 itt)
bcd Qn om visita
1
Cossvelurn fj
z
an ASU characloy
ial fiedgolumn Cchay ¢ i
int
eric oi tz2¢; iat) §
if Cr Ci] fodsec)
—Telurn, ip
Nal_found
JPR IE teak tee i
JRE OSES OG A Ho
i
|
i
i
:
:
=prio( —)
SSIS eR Rob ok kok tk
importa java math - Big]
| import.java nia chasse
—impont-java-seeusity -
—impavt-
# indlude ‘
Noid_enexyphfisg Char engl, ink key) 2
int_msglen= Sten (ms), i jy ke L200 =), Co) =O;
that sail Patatz key} Consqle ni;
fox li=0; ickey;++i)
Fer '=0; jc salen; +4)
FallMadixG IC] ="\n':
PailMadzix FroeI Lol eels msgCi Tj
if Crou) = = afl -xeea = =key-1)
keke (<1); a
He
o RAT RAH AAR JP SSeS ib tek:
*
*
*
*
*
*
*
oe ‘
: foxlizo; iz msglenj ++i 5
*
*
&
cashaa. ennai)
key)
ten COGS lel teens
«Ckey}[imeghen]age No. ( )
Je Ee
Conelusion The Rail Pence ld evith
is Some Capegaphy nf)
ie Pentti. ng} SECUYE
Lungage.
Stay
HAA AI AAA AHA AAI
a
Jee# Decryplion
del decrypiliessage (cipher):
meg
A tn k lodices
ke tad* = 0
# dyacle
ms4- ind« anne
foX - in tang é (col)? ame
curr: idx = key . index (hey-Jst [tk )
fox {in ange (rows)?
dec. Cipher LjI Cour: idx] = msg
59 indx += 1
FOREN AEH HEHE )e nen ERR REE
ZS
SORE HEHE GOGH EEE EES EI BOIS GOO On nr i nienionce:
5
:
=
‘
at
:
5
:
:
4
we a
SEE
one
)
pee
Page No. (
ieee teretePage No. ( ) 7
Heehehiihaddeiaia AROSE OREO ER RHEE
es indepen:
+e:
(Sum (dee Ciphew, £1)
aaise aC This_p cannot")
ae “hed ly nods.)
159 = Coun, ieee Eee
—if_oull-Countsp:
stetuan sq f: - null
a a
er LV CLIT LL
tte
ir FIA I IAI I I TI III IIIA II AA A DAA AOI AISI AAA A A A
ypled Pessage ? § 2!
= se Cepia
> E|
i Se era
then_zéading the ciphertex! of ¢ —_iqn_
a . Jumn < . oO
FEO EO HEHE OOF RCE.
:
AO EE IEE K( JHA ee HHEE eine‘
:
:
: e
# tool _Ce-9-Cayptoal)
:
ce
—and verify digital |
Conelusinn t= The Digi siqnadure —crve
the simple —corypiaol Tis eocify
of the digital i uve. 2
Meee
Heir
I IO
a JiR Here REE ES
Cpungeroe*
:
*
:
:
:
rr
:
:
+
*
*
*
:
+ee
*
+
*
EERE REE Re
eeeeeeee
i
SeEHEEH ENERO HERON \ekeenneenonnennnen
Practical No +1 *
Use Sleganaqaaphy to eaeel encode and *
decode the message. using any _taal- :
—Thé—ismad_Steqanagaaphy is derrived {20m *
fino _bineek oords . “Shegas,' meaning ‘40 :
and gaayfia', meaning wailing’ .thus i i
‘hidden “Uailing ;
& Steganography is _a_ methad nf hiding ‘
data. hy embedding 14 inta an audio, video, — $
do “Covered Waiting’ on
employed to protect secre
from _omuiciaus citlacks
COT Iame.
TEA Tene syplion Algonxith
HEI I I I I I I (
dinagé oy ted fe. 1} is one af the methods
—Sieqo- image
or sensitive dada
{
JHB BOG RRO
S‘ a a
2 cll _fjxet)
;
: =
*
: s
:
: 3
eee
: Es =
: 2 =n
*
eRe
FAR ORO IOR( Jet Re
page No. ( )
Ben tthe enon: Da
—Prnclica) nas 19. eevnenneenennnnenn
—Fxecna|
iF
N—ANY _APpemaling System
Sep L: Securte uy Liredall
hepa: Pachiler ae fizesvall
and IP.
Zanes.
: Con gue access Coola) lis
ancl lagging.
EN Ie
&
S_Tes) your fiaemall Confiquaction
bl Configu: me. Siveurall
sem,
—bpeaciting ac Hee
Dfiquaing a fxewall invalves various
Components = from _haadawye and safimare
te _clocumentatinn and awies- that aro
Jo cxende, a xobust security
:
*
*
‘
*
*
*
*
c . ; E —.
ofiquae. Your _othea fireaiall Services *
*
*
;
*
*
*
*
:
*
*
:
*
:
E
F
|
|
.
*
*
*
*
*
*
*
*
*
*
*
*
*a
free my —Signadinee_hubtan forse signing
:
age No. ( )
ae “<=
peo tie i eee =
a P2QACIica) Np + Terre rer
eee
oe tl eg cayping yy Se Cette,
1 After eee s
: ie ee OD ——
et UY oie a Sides Login ax *
ule a ee he one, §
: ue #£4_sernnds. as
: eee
d—Slorage Corspatihility itp
—fuickly uplaad the needed dar
~Clauds with alenast any
;
;
:
$ Gam_prefenced
device. it
:
;
pADee texual contend place i include
¢
:
:
*
*
*
=
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
+
*
*
+
*
.
*
dude. signi he_sigcing
equine ta ane ov several recipienis
a ere
Hay
a
TOE KER eH EGERa
No. ( )
rite
Z:. * eee eg,
| 2Opely the pay -buddor
ae 0.
eso teal ine
t
B
R
(eens
generated en
aller su
hash vedic
|
b
i]
Mee nen eens
; aero
N—finished to
Teaiby digital signals
eS
soe
fly 4e0tciog Reyes eccnal—ina
2 ended YS meal| pan?
FEE
* * eee,
Bee
tees. eroail
onl zs
he
Date
Raachicg)
orig
Meanes
a
Ackea Pa)
—the_entive, email hat
len} coil he vis; ble.
reece
CAS
indow € You Will be aequived to
fee bea aye )
OBER HERE°
) te
page No. ( Date
SEISIIOB OR A A a ee
a
x
*
‘ :
$2tiold down the ‘chal ' bitin nur keybaard %
$4 then parss the ~c' kew ance. this hac z
¥ copied the highlighted headers. :
$= on! the _heade have heen paste, =
¢ Glick ithe * Trace’ butlan in initiate {he *
= —hace. :
*
3 a
gclllistantes the saute to lake ta luare mal *
*
$-emailheadee tohils! in the [ie Tah na thon x
¥ ty race Repavis tion and Click the Fra :
; ;
foiitadems option, —_______*
: *
*
: The email trace dinteg wil) nppenrras Shaun *
F above These are two aplinns rahe L -
# an_email. brace nn mail T have receive =
: :
* *
s *
* *
: 7%
z *
ry :
$ Headeres. *
; a ae *
:—— *
$ Conclusion: one method | *
Fa: ff an—emall is _by anal *
§ addvess —in formation _ A x
’ headers. BE ap ¥
, *
Seen eneeneneeeeeney : eee
WAPN Ss sneasecavint
=>Oe en
oT
Fe:
a
page No. (
#ifmd ond press Qiey tn 2PED_A Command
*
Eke the Jalieising sleps 4 40a a feraicexoude
By pc“ns.; a —_______ _
~Lithe _spalligh! tenn 4 ican in the TMenu | hor
Note
elf
)
geenrteeneeseesesnes, Mensensennsenesene
—__p- eee -Noi15
ace the
ee eet _galacal (TP) packet | aR to_its
destination tram Sauce. Fracent
deleamine ihe Seen toa Besledlen. IL
Sending Tnlewnel Coolaal Message
ee eee 4o the
a
|
—Sleps te in a_taacex a
allindews key +R fo open ee Run -toindaas.
R
The—icon looks like A—magnikying glass
4 fhler Nelmenk Ulilily jaca the spailignb
ebeetLLEee tee et OOOH ERR EEENo. ( )
SEO
am I Date :
OO II
*
*
* cs
* .
*
*
*
*
vie
*
*
*
*
* . .
*
* 2
*
* - .
=
“3 sh:
*
a
*
*
pbekaeen Your computer anda sperifiod
x
Detwoxk and the Tnlenme}.
*
*
: : aoe
$ hop Thi Uiility helps you find where high
2 ; ; ;
+
*
+
*
*
—Netudovks Sei CS prypviclerr
*
OR I II OK( a a i aie i ei ai a a
*
*
*
*
*
*
*
*
*
+
*
*
+
*
*
+
+
*
+
*
+
*
IOI ARR KO IO I I IAAI AAAS AIA I A III AIA A A IAS AHI IN AN AA AA ACA AA ANo. ( )
Brett este tesensy
Date :
i Nee Renn
FOO OO IK
vi
to ¢antinue) ¢ Click pjoxt.
Cor@nite
FIFI IO OO TIO:
Biiscccsskeceeseen( OEIC I ISI IOI He:No. ( )
HH HE He ak
wee CK,
'
’
‘
'
:
a
¥
* *
= *
De
*
:
9
g
HE
i
*
*
- *
: *
*
2 *
*
SORE
se
Fiz” Code.
FTp Login
-E Tp Passunval
$ nn the Encryption key Sectinn . Click Porniee.
Eh t t
Set_during the exported in siep 4 oF jhic
Micle -
FIO OI OI OI III A A A At AA
) 9 I RHE A IE A eeWS
eee
Dat ws
at
ee RH RH
“aill he
thé Blaarbera
xotocol_. SE TP ——______
= . i. ei
he fle, 12 dowloaded
Eitan
+
) M000 S*seuseesenes
te
RR
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
-
+
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*