Learning Goal: I’m working on a cyber security project and need an explanation t

Learning Goal: I’m working on a cyber security project and need an explanation to help me learn.Hands-on ProjectsPROjECT 1FileVerifier++® is a tool that will compute hashes onany single file, or all of your files at once. These hashesare then checked to see if there have been any changesto those files. FileVerifier++ can quickly check theintegrity of a large number of files.FileVerifier++ is useful if you need to verify thata given set of files has not been changed or altered inany way. For example, it could be used to verify thatcustomer, employee, financial, or sales records werenot manipulated. If a file was changed without autho-rization, it can be compared with an earlier version todetermine which changes were made. Using a file veri-fier is one way IT security professionals can detect apossible intrusion.1. Download and install FileVerifier++ from http://www.programmingunlimited.net.2. Start, All Programs, FileVerifier++, and FileVerifier++.3. In FileVerifier++, click the Options button.4. Change the Default Algorithm to MD5.5. Click OK.6. Click on the Dirs button to select the directoriesyou want. (You can also select individual files.)7. Browse to and select your downloads directory.8. Click OK.9. Take a screenshot.10. Click the Verify All button. (Browse to your down-loads directory if necessary.)11. Click OK.12. Take a screenshot.13. Create a new text file named YourNameHash.txt,and save it in your downloads folder. (ReplaceYourName with your first and last names.)14. Open the text file labeled YourNameHash.txt youjust created in your downloads folder.15. Add your name to the contents of the text file.16. Save your changes to that text file by clicking Fileand Save.17. Close the text file.18. In the FileVerifier++ window, click Verify All again.(Browse to your downloads folder if necessary.)19. Scroll down until you can see the text file that youchanged. (It should be highlighted in red.)20. Take a screenshot.PROjECT 2Good administrators check their logs regularly. Theyneed to know what went on when they were away. Theyneed to look for intruders, compromised machines, sto-len or deleted files, and so on. The list of things to lookfor can be extensive.Microsoft Windows Event Viewer® is a simpleprogram that organizes these logs in a way that makesChapter 7 • Host Hardening 443them easy to view. Learning how Event Viewer worksis a great training platform for beginners. It is also auseful diagnostic tool.In this example, you will enable logging of secu-rity events, log in and out of your machine, and thenlook up the event in Event Viewer.1. Click Start, Control Panel, System and Security,Administrative Tools, and Local Security Policy.2. Click on Local Policies and Audit Policy.3. Double-click on the policy labeled “Audit accountlogon events.”4. Select both Success and Failure.5. Click OK.6. Double-click on the policy labeled “Audit logonevents.”7. Select both Success and Failure.8. Click OK.9. Take a screenshot.10. In the control panel, click System and Security,Administrative Tools, and Event Viewer.11. Click Windows Logs and Security.12. Take a screenshot.13. Log off your computer (you don’t need to shutdown) by clicking Start, the drop-down menu nextto Shut down, and Log Off.14. Log onto your computer by clicking your user-name and entering your password.15. In the control panel, click System and Security,Administrative Tools, and Event Viewer.16. Click Windows Logs and Security.17. Take a screenshot.18. Double-click on the Logon/Logoff event that wasjust recorded.19. Take a screenshot.20. Click Close.21. Click Applications and Services Logs and MicrosoftOffice Sessions.22. Click on one of the log events.23. Take a screenshot.Assignments Submission Direction for all Lab assignment and projects Before you start working on the projects, keep a word document open. Take screen captures while performing the steps, and plug them in the document. Do not forget to number the steps. That will help me to check if the screen capture matches with the step, and how did you complete the project. Once the last step is done, I want you to look back at all the steps and the purpose of the project. Write a brief lab reflection -i.e . what did you achieve in the lab, why did you do, and what did you learn. I do not want to know “how did you do’. The screen captures will show me anyway ‘how did you do’.
Please submit a single document with all projects.
I reserve the right to deduct points if your screen captures are not clear enough. i.e. time-stamp on your host machine , or your user name in the virtual machine.
Requirements: depends

Leave a comment

Your email address will not be published.