Premium Essay

Lab 7 Fundementals of Cyber Security

In: Computers and Technology

Submitted By ghiyanadance
Words 442
Pages 2
Assessment Worksheet

111

LAB #7 – ASSESSMENT WORKSHEET

Relate Windows Encryption and Hashing to Confidentiality and Integrity
Course Name and Number:
CSIA301

Overview
This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.

Lab Assessment Questions & Answers
1. If you and another person want to encrypt messages, should you provide that person with your public

7
Relate Windows Encryption and Hashing to Confidentiality and Integrity

key, private key, or both?
In theory you could, but I you are taking the time out to make in the encrypted messages I'm assuming you wouldn't want others to know, but I think you have to provide the person with both you need both to access the

messages.

2. What does GPG allow you to do once it is installed?
GPG is specifically a command line tool that enables you to encrypt and sign your data and communication and includes a

key management system as well as access modules for all kind of public key directories.

3. Name two different types of encryption supported by GPG for your key.

112

LAB #7 | Relate Windows Encryption and Hashing to Confidentiality and Integrity
4. What happens when you sign and trust a new key to your keychain?

5. If a user sends you his/her public key, will he/she be able to decrypt your encrypted messages once you

import and sign his/her key?

6. What are the similarities between an MD5 hash and a fingerprint?

Fingerprints are created by applying a cryptographic hash function to a public key.

You need a fingerprint to create a hash.

7. How would you encrypt a Web server and the pages…...

Similar Documents

Premium Essay

Cyber Security

...Testing ACC 626: IT Research Paper Emily Chow 20241123 July 1, 2011 I. Introduction Due to the increasing vulnerability to hacking in today’s changing security environment, the protection of an organization’s information security system has become a business imperative . With the access to the Internet by anyone, anywhere and anytime, the Internet’s “ubiquitous presence and global accessibility” can become an organization’s weakness because its security controls can become more easily compromised by internal and external threats. Hence, the purpose of the research paper is to strengthen the awareness of ethical hacking in the Chartered Accountants (CA) profession, also known as penetration testing, by evaluating the effectiveness and efficiency of the information security system. 2 1 II. What is Ethical Hacking/Penetration Testing? Ethical hacking and penetration testing is a preventative measure which consists of a chain of legitimate tools that identify and exploit a company’s security weaknesses . It uses the same or similar techniques of malicious hackers to attack key vulnerabilities in the company’s security system, which then can be mitigated and closed. In other words, penetration testing can be described as not “tapping the door” , but “breaking through the door” . These tests reveal how easy an organization’s security controls can be penetrated, and to obtain access to its confidential and sensitive information asset by hackers. As a result, ethical hacking is......

Words: 11999 - Pages: 48

Free Essay

Lab 7 Security

...NT1110T Wednesday May 9, 2012 Lab 7: Security Basics Task 1 Hardware and Software Firewalls Barracuda Networks has a wide variety of Software and Hardware firewalls. They produce Spam and Virus firewalls protection, Web Filtering, and Barracuda Central. Barracudas Spam and Virus protection uses different methods of keeping your network secure such as 12 Defense Layers, Barracuda Reputation and Intent Analysis ,Predictive Sender Profiling, Barracuda Real-Time Protection, Triple Layer Antivirus Protection, Image Spam Protection, PDF Spam Protection, Mail Transport and Policy, and Clustering. Barracuda’s Web filtering methods include Spyware Protection, Application Blocking, Content Filtering, and Content Categories. All of these methods are then filtered into Barracuda Central where the main hub of Barracuda’s security program works its filtering throughout the web. Barracuda Central Collects Data From All Over The World Barracuda Central collects emails, URLs and other data from all over the world. Barracuda Central has thousands of collection points located in over 100 countries. In addition, Barracuda Central collects data contributions from more than 100,000 Barracuda products in use by customers. Barracuda Central analyzes the data collected and develops defenses, rules and signatures to defend Barracuda's customers. You can purchase a Barracuda web router and use their personalized software for your computer system which is fed into the Barracuda hardware......

Words: 876 - Pages: 4

Premium Essay

Cyber Security

...UNIVERSITY | Cyber Security | | Patrice Brockington | 4/20/2013 | | Cyber Security The security of online files, applications, documents, consumer information, and organization information are just some of the valued items that need to be secure from cyber threats. Companies and organization that utilize the internet to conduct business know all too well the importance of securing the information and any and all information of those that they do business with. Having some general knowledge of what cyber security is and the importance of it is our purpose in this brief. Cyber security is the “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack”, as defined by Merriam-Webster.com (Online, 2013). In general practice cyber security is simply securing online information and service systems. If you ever entered your name, address or any personal information online or into some database to win a prize this information is online or somehow accessible via the Internet. It is this type of information that so many millions of people are concerned about if it is secure or not, since it is out on the Internet. “The nation’s critical infrastructure relies heavily on the Internet for everything from submitting taxes, to applying for student loans, to following traffic signals, to even powering our homes” (Government, 2013). This is why cyber security is one of this country’s most important national......

Words: 645 - Pages: 3

Free Essay

Tb143 Lab 7 Security Basic

...Task 1: Firewall is software or hardware based network security system to protect between your computer network and the internet. Hardware firewalls are best suited to business and large networks, whereas Software firewalls are best suited for home use. Hardware firewalls is a small metal box so one could hook up to a computer network just like if you were to add a printer etc. Software firewalls gives you a level of protections from hackers and unwanted intrusions. Software firewalls packages has anti spam, antivirus, even anti-popup ads. There are also parental controls to manage what or certain websites your minor can visit. Barracuda Firewall is the newest Hardware. It has email, web, and network security. Barracuda provides intrusion prevention, virus scanning, content filtering, and reporting. Barracuda Firewall is perfect fit for small and medium sized businesses. Zone Alarm protect your PC from viruses and spyware, also has internet firewall, internet browser security and theft prevention, and email virus scan. This is example of a software firewall, great for home use. Task 2: Avg, and Panda offer Free anti-virus programs to protect your computer. Norton and Kaspersky offer trial run versions for a number of months then thereafter one could purchase the anti-virus program. Trojan horse programs is a type of file converters, but also it could install harmful programs such as spyware and rootkits. Malicious email attachments are a way for a sender to transmit......

Words: 687 - Pages: 3

Free Essay

Cyber Security

...Research Paper – Cyber Security From the growing use of smart phones to access the Internet to rogue employees in the workplace, the threat of cyber terrorism is increasingly on the minds of C-suite executives. At a recent conference sponsored by the Raritan Valley Community College Foundation, security experts addressed the threats, the exposures and the legal issues and best practices to bolster cyber defenses. Virginia Bauer, CEO of East Rutherford-based security company GTBM, explained that many people, like herself, first became familiar with security threats on 9-11(Bauer's husband was killed in the attacks and she has since been a 9-11 families advocate). "To combat the threat, better private and public partnerships are needed to develop solutions, something the 9-11 Commission recommended," she explained. GTBM's main product is Info-Corp(TM), a system that conducts real-time identification checks, scanning local, state, and federal National Crime Information Center (NCIC) databases, the Federal Terrorist Screening Watch List and all 50 states' motor vehicle databases. The identification checks are important to companies because the biggest cyber threat to businesses can be its employees. "Most cyber attacks happen internally," Bauer said. "The people who can be the most threatening to you are sitting in your offices, or are your consultants and vendors." Govi Rao, chairman of the New Jersey Technology Council and president and CEO of Noveda Technologies (a......

Words: 527 - Pages: 3

Free Essay

Lab 7 Security Basics

...Lab 7: Security Basics Task 1: Procedure 1. An example of hardware firewall is Belkin, and an example of software is Norton 360. Task 2: Procedure 1. Almost all anti-virus programs offer some sort of trial period for first-time users. McAfee is the only one that I know for sure offers free protection. 2. A Trojan Horse is an email virus usually released by an email attachment. If opened, it will scour your hard drive for any personal and financial information such as your social security, account, and PIN numbers. Once it has collected your info, it is sent to a thief’s database. A malicious email message is one which had been deliberately crafted to cause problems on the server or on the client. Drive- by downloads are downloads which a person authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet). .Any download that happens without a person's knowledge, often a computer virus, spyware, malware, or crime ware. Task 3: Procedure 1. Full backup is a complete backup of everything you want to backup. Differential backup software looks at which files have changed since you last did a full backup. Then creates copies of all the files that are different from the ones in the full backup. Incremental backup software creates copies of all the files, or parts of files that have changed since previous backups of any type (full, differential or......

Words: 432 - Pages: 2

Premium Essay

Cyber Security

...STUDY GUIDE Cyber Security 1. What is the difference between a threat agent and a threat? Threat: A category of objects, persons, or other entities that presents a danger to an asset. Threats are always present and can be purposeful or undirected. For example, hackers purposefully threaten unprotected information systems, while severe storms incidentally threaten buildings and their contents. Threat agent: The specific instance or a component of a threat. For example, all hackers in the world present a collective threat, while Kevin Mitnick, who was convicted for hacking into phone systems, is a specific threat agent. Likewise, a lightning strike, hailstorm, or tornado is a threat agent that is part of the threat of severe storms. 2. What is the difference between vulnerability and exposure? Vulnerability: A weaknesses or fault in a system or protection mechanism that opens it to attack or damage. Some examples of vulnerabilities are a flaw in a software package, an unprotected system port, and an unlocked door. Some well-known vulnerabilities have been examined, documented, and published; others remain latent (or undiscovered). Exposure: A condition or state of being exposed. In information security, exposure exists when a vulnerability known to an attacker is present. 3. How is infrastructure protection (assuring the security of utility services) related to information security? The organization needs to have clear parameters and set regulation when......

Words: 894 - Pages: 4

Premium Essay

Cyber Security

...System Administrators are the ones responsible for ensuring computers work in the business world. Along with that responsibility, comes the accountability when the operating systems (OS) fail to meet business needs. Maintaining the security of e-commerce and business processes is a major concern for system administrators. Protecting the operating systems is the main component when it comes to shielding all the information systems. The software scripts of the OS are what enable network devices, servers and desktops to communicate as a whole. OS is the glue that keeps all the files, hardware, and software together. The OS role includes managing files, processing controls of computer programs, and serving as GUI between the computer and user. With all the responsibility an OS is bound to have weaknesses. Typically, security vulnerabilities are usually rooted from glitches/bugs in the scripts that run beneath the OS. The most commonly used OS are Unix, Mac OS, and Microsoft Windows. With Windows being the leading OS, security patches have to be downloaded constantly. With out identifying a specific OS, there are advantages and disadvantages that can be implemented to protect the OS. Advantages of Securing OS Mitigating internal security threats is a common practice that should have a plan of action to protect business systems as a whole. Securing the physical hardware; servers, consoles routers etc. is essential. The actual system it self should be physically protected and......

Words: 2482 - Pages: 10

Premium Essay

Cyber Security

...INTRODUCTION: This research report conducts analysis on security. Technology these days is going up very fast and technology has been changed the route business administered by giving online services to their customers, to secure data in to “cloud” and allowing them to get their data from smart phones and tablets. This process of securing data has given many benefits to small and large business alike. But where the benefits are there will be some risk present. Risk will be like lost of data or to protect data by any attack of security. According to a survey which took place in 2012 about security, the graph of crimes and security attacks is gradually going up every year. As we talk about security it’s a very huge field to do research on it. Security has many different units in a field. One can’t do a research on this topic. The topic I am going to discuss in my research is cyber security. Cyber security these days is important everywhere. Where ever the data is, we need cyber security to protect and maintain our data according to our requirements Cyber crime is far reaching, general and continually joined with different parts of the criminal natural gathering. It runs from the thievery of a specific's character to the complete interruption of a nation's Internet compromise in light of a huge trap against its masterminding and taking care of assets. The definite focus of cybercrime divisions is on information-the information which is stored electronically for resulting......

Words: 1426 - Pages: 6

Free Essay

Nt1110 Lab 7 Security Basics

...Lab 7: Security Basics Lab 7: Security Basics Task 1: Software: We offer solutions to fit all of your security needs. | Free Antivirus + Firewall | Internet Security Suite | Extreme Security | Antivirus/Anti-Spyware EngineDetects and blocks viruses, spyware, Trojan horses, worms, bots, and rootkits. | | | | Two-Way FirewallMakes your PC invisible to hackers and stops spyware from sending your data out to the Internet. | | | | Advanced FirewallMonitors programs for suspicious behavior spotting and stopping new attacks that bypass traditional anti-virus protection. | | | | Privacy & Security ToolbarProvides site check, do not track, Facebook privacy scan, private browsing and more. | | | | Identity ProtectionMonitors your credit and alerts you of changes in your credit files. | | | | Advanced Real-Time AntivirusChecks files against an always-up-to-date cloud database of antivirus signatures. | | | | Enhanced Browser ProtectionProtects your computer by blocking web threats before they reach your browser. | | | | SupportCustomer service and technical support available 24/7 via live chat. | | | | Parental ControlsFilters and blocks inappropriate websites and limits time spent online. | | | | Threat EmulationAnalyzes downloads and warns you if a download is malicious--stopping it from infecting your PC. | | | | Find My LaptopLocates your lost or stolen laptop on a map, locks it down and recovers important......

Words: 1060 - Pages: 5

Premium Essay

Cyber Security

...CYBER SECURITY NAME ISNTITUTION Cyber security plays an important part in managing information for various functions. In hospitals for example where doctors need to share information about several patients and all other important information about emergency and non-emergency access of this information. The security and privacy of a patient is one of the key points in the doctors’ profession. There are several ways in which patient’s information can be secured online through the internet and the intranet as used by various health facilities. This information regarding health care, patient, and administrator records need to be secure for a credible healthcare system (Shoemaker & Conklin, 2012). While designing any system it is necessary to determine the security risk that is generated while developing any platform that is used. In understanding the security risks estimation, one has to carefully analyze the intensity of the risk and classify them accordingly. One of the ways in which you can classify the risks is to look at the impact in which the risk may put to the information. This can be low impact and high impact. Low impact risk will be given lowest priority while responding to risk while that with the high impact will be given the highest priority. One of the ways used in analyzing the risks is by using the protection poker for software risk assessment. This analyzes the ease of attack. Ease of attack looks at the vulnerability of the site and......

Words: 596 - Pages: 3

Free Essay

Cyber Security: Cyber Terrorism

...Introduction Cyber security refers to the practices and processes that are used in technologies such as networks, computers, information and programs from damages by unwarranted entities (Ahmad, Yunos & Sahib, 2012). There are different attacks towards technology which may distort information or be used to create tension in an organization. Information stored in computers has some level of privacy and this depends on the level of sensitivity that such information may have towards that organization. Business strategies, political discussions and government documents are some of the documents that require a higher degree of privacy. However, there are individuals who cause deliberate attacks on the information systems of organizations and governments in order to unlawfully access information or distort the meaning of such data. The intention of cyber attacks has led to the classification of these attacks into particular classes. For example, we have cyber bullying and cyber terrorism. Under cyber bullying, the attackers use technology to abuse and intimidate their targets. Cyber bullying has been common through the presence of the social media where an individual will use pseudo-accounts to publish half truths about others with a bid to embarrass them. On the other hand, cyber terrorism involves the use of technology to access vital government sites in order to cause harm and fear in the society through terrorism activities. Brunst (2010) indicates that cyber terrorist......

Words: 1810 - Pages: 8

Premium Essay

Cyber Security

...CYBER SECURITY INTRODUCTION It is also known as “Computer Security or IT security”. It is applied to the security of computer, computer network and the data stored and transmitted over them. Today the computer system are used in wide variety of “smart devices, including Smartphone’s,  televisions and tiny devices as part of the Internet of Things, and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other networks. Computer security covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction and the process of applying security measures to ensure confidentiality, integrity, and availability of data both in transit and at rest. There are the various elements of the cyber security which are as: 1. Application Security 2. Information Security 3. Network Security 4. Mobile Security 5. Internet Security 6. Cyberwarfare One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks. The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected. "The threat is advancing quicker than we can keep up with it. The threat changes faster than our idea of the risk. It's no......

Words: 3559 - Pages: 15

Premium Essay

Cyber Security

...6 20 Cyber crime:Law Enforcement And E-Government Transnational Issues Individ ual Assignment #1 Leggett,Ronnell 3/3/13 2 Table Of Content Introduction ................................................................. 3-5 Current Government Interventions/ Methods............. 5-7 linpact/Effects .............................................................. 7-8 Private Industry Rcsponsibilit)' ............................... 8-9 Conclusion ........................................................................ 9-10 Reference Page ........................................................... 11 3 Introd uction Over the last several years we have witnessed many changes and transformations occur in tcclmology including advances in phone. television, and compu ter comm unication outlets. Being able to use and ma nipulate technology has now become an essential part of everyday lifo, this is especiall y important with the use of the World Wide Web and the plentiful resources it has to offer. With these new advances of technology we often find an apparent generation gap where more and more Americans arc born into new technology \'1hi lc others arc still trying lo figure it ou t. Most impo11 y. with these tech nological advances. crime has adapted to thi s new age as antl well. Consumers are pu t at new and higher risks when purchasi ng goods (Baker. 2006). Several decades ago the crimes reported by the news w1::re of a physical natu......

Words: 2550 - Pages: 11

Premium Essay

Cyber Security

...Cyber security is a critical and growing issue in the world today. President Obama said this issue is, "one of the most serious economic and national security threats our nation faces" (Cybersecurity). The United States is one of the most computer dependent societies and has the most computer dependent military and intelligence agencies. With more and, more of our country being ran by technology we are at a bigger risk of attack. A cyber attack could be the most devastating attack our country has ever faced. An attack on America’s cyber infrastructure could cripple the country and put us at an even greater risk of a normal attack. FBI Director said “Counterterrorism — stopping terrorist attacks — with the FBI is the present number one priority. But down the road, the cyber threat, which cuts across all FBI programs, will be the number one threat to the country” (Paganini). The message is clear the cyber security threat we are facing today is a dangerous and growing threat that has serious offensive potential and is often difficult to detect or prevent. An attack on a nation’s critical infrastructure can be devastating and when you add the fact that cyber attacks often do not make themselves know until it is to late could make for a devastating first strike prior to an invasion. Cyber security is defined as measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. The term “cyber security threat”......

Words: 2041 - Pages: 9

Lançamentos em 1974 | [share_ebook] Concise Encyclopedia of Language and Religion | Brahim Achabbakhe