Hands-on-26.03.docx

  • Uploaded by: Hoài Thu Nguyễn
  • 0
  • 0
  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Hands-on-26.03.docx as PDF for free.

More details

  • Words: 426
  • Pages: 15
PRINCIPLES OF INFORMATION SECURITY

A REPORT

Prepared by: NGUYÊN THI HOAI THU

A student from: MIS2016A

Student ID:

16071309

Prepared for: NGUYEN DAI THO

March 26, 2019 1

PRINCIPLES OF INFORMATION SECURITY

LAB 3.11A FILE INTEGRITY TESTING WITH HASH-MD5SUMMER Generating Hash Values with MD5summer

Figure 3.11-1 at step 2

2

PRINCIPLES OF INFORMATION SECURITY

Figure 3.11.2 at Step 4

Figure 3.11-3 at step 6

3

PRINCIPLES OF INFORMATION SECURITY

Figure 3.11-4 at step 8 Step 9: There are 5 files that were found in my directory.

4

PRINCIPLES OF INFORMATION SECURITY

Validating Hash Values with MD5summer

Figure 3.11-5 at step 3

Figure 3.11-6 at step 5

5

PRINCIPLES OF INFORMATION SECURITY

Figure 3.11-7 at step 6

6

PRINCIPLES OF INFORMATION SECURITY

3.11B FILE INTEGRITY CHECKING WITH FILEVERIFIER++

Figure 3.11-8 at step 1

7

PRINCIPLES OF INFORMATION SECURITY

Figure 3.11-9 at step 4

Figure 3.11-10 at step 6

8

PRINCIPLES OF INFORMATION SECURITY

Figure 3.11-11 at step 8

Step 9: There are 4 differences as following: The first one is the original status is valid but actual is invalid. The second one is that the actual size is 53 bytes but the original is 0 bytes The third one is that the actual modification time is 3/26/2019 2:56:42 AM but the original modification time is 3/26/2019 2:42:42 AM The last difference is actual Hash Value fdb6 but the original Hash Value is 0000

9

PRINCIPLES OF INFORMATION SECURITY

LAB 3.12A LOG SECURITY ISSUES WITH CLIENT VIEWER

Figure 3.12-1 at step 1 Step 2: The application error items are VSS, Msinstaller, .NET Runtime, CAPI2, Office 2016 Licensing Service The application warning item is User Profile Service.

10

PRINCIPLES OF INFORMATION SECURITY

Figure 3.12-2 at step 3 Step 6: The security error item is Microsoft window security auditing There is no security warning items.

The system error items are bowser, Service Control Manager, DNS Client Events. The system warning items are hcmon, iaStorA

11

PRINCIPLES OF INFORMATION SECURITY

LAB 3.12B LOG SECURITY ISSUES WITH MMC

Figure 3.12-3 at step 1

Figure 3.12-3 at step 2 12

PRINCIPLES OF INFORMATION SECURITY

Figure 3.12- 5 at step 3

Figure 3.12-6 at step 6

13

PRINCIPLES OF INFORMATION SECURITY

Figure 3.12-7 at step 7 Step 8: Some of the events listed in the Security logs are:      

SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege

Step 9: My current settings for the maximum log size is : 20480 KB Step 10: One day is log events are overwritten

14

PRINCIPLES OF INFORMATION SECURITY

Figure 3.12-8 at step 11

15

More Documents from "Hoài Thu Nguyễn"