PRINCIPLES OF INFORMATION SECURITY
A REPORT
Prepared by: NGUYÊN THI HOAI THU
A student from: MIS2016A
Student ID:
16071309
Prepared for: NGUYEN DAI THO
March 26, 2019 1
PRINCIPLES OF INFORMATION SECURITY
LAB 3.11A FILE INTEGRITY TESTING WITH HASH-MD5SUMMER Generating Hash Values with MD5summer
Figure 3.11-1 at step 2
2
PRINCIPLES OF INFORMATION SECURITY
Figure 3.11.2 at Step 4
Figure 3.11-3 at step 6
3
PRINCIPLES OF INFORMATION SECURITY
Figure 3.11-4 at step 8 Step 9: There are 5 files that were found in my directory.
4
PRINCIPLES OF INFORMATION SECURITY
Validating Hash Values with MD5summer
Figure 3.11-5 at step 3
Figure 3.11-6 at step 5
5
PRINCIPLES OF INFORMATION SECURITY
Figure 3.11-7 at step 6
6
PRINCIPLES OF INFORMATION SECURITY
3.11B FILE INTEGRITY CHECKING WITH FILEVERIFIER++
Figure 3.11-8 at step 1
7
PRINCIPLES OF INFORMATION SECURITY
Figure 3.11-9 at step 4
Figure 3.11-10 at step 6
8
PRINCIPLES OF INFORMATION SECURITY
Figure 3.11-11 at step 8
Step 9: There are 4 differences as following: The first one is the original status is valid but actual is invalid. The second one is that the actual size is 53 bytes but the original is 0 bytes The third one is that the actual modification time is 3/26/2019 2:56:42 AM but the original modification time is 3/26/2019 2:42:42 AM The last difference is actual Hash Value fdb6 but the original Hash Value is 0000
9
PRINCIPLES OF INFORMATION SECURITY
LAB 3.12A LOG SECURITY ISSUES WITH CLIENT VIEWER
Figure 3.12-1 at step 1 Step 2: The application error items are VSS, Msinstaller, .NET Runtime, CAPI2, Office 2016 Licensing Service The application warning item is User Profile Service.
10
PRINCIPLES OF INFORMATION SECURITY
Figure 3.12-2 at step 3 Step 6: The security error item is Microsoft window security auditing There is no security warning items.
The system error items are bowser, Service Control Manager, DNS Client Events. The system warning items are hcmon, iaStorA
11
PRINCIPLES OF INFORMATION SECURITY
LAB 3.12B LOG SECURITY ISSUES WITH MMC
Figure 3.12-3 at step 1
Figure 3.12-3 at step 2 12
PRINCIPLES OF INFORMATION SECURITY
Figure 3.12- 5 at step 3
Figure 3.12-6 at step 6
13
PRINCIPLES OF INFORMATION SECURITY
Figure 3.12-7 at step 7 Step 8: Some of the events listed in the Security logs are:
SeAssignPrimaryTokenPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeBackupPrivilege
Step 9: My current settings for the maximum log size is : 20480 KB Step 10: One day is log events are overwritten
14
PRINCIPLES OF INFORMATION SECURITY
Figure 3.12-8 at step 11
15