Before using the windows server backup, I have setup a Hyper-V virtual machine on target computer and install the software of Windows Server Backup on both domain controller and domain member computer. First, created a virtual hard disk on a Hyper-V virtual machine, these steps are strict forward, just created a virtual hard disk andContinue reading “Lab 16: Backup and Recovery”
Category Archives: SEC602
Lab 15: Data Encryption
In the lab, I establish an encrypted drive on the computer by using bitlocker. First, using group policy management to create GPO in the domain computer, plabwin810, this can set the security filtering on the target computer. After enable the functionality of bitlocker on the target computer, I have created a new partition on theContinue reading “Lab 15: Data Encryption”
Lab 14: Implementing DNSSEC
The Domain Name System Security Extensions (DNSSEC) is using public key cryptography to increase the security during user requesting IP address for a server for the DNS name space. It allows DNS zone to be digitally singed to protects it from attacks and improve the security of the DNS environment. In the DNSSEC, it involvesContinue reading “Lab 14: Implementing DNSSEC”
Lab 13: Implementing a Network Policy Server
In the lab exercise, I have used the network policy server to setup the Radius clients for implementing a network policy server. During the setup process, I have come across several step, one of them are selecting the authentication methods. As the default setting of the authentication method are extensible authentication protocol (EAP)and Microsoft encryptedContinue reading “Lab 13: Implementing a Network Policy Server”
Lab 12: Wi-Fi Access Point Security
Introduction Network security is very important every organization to provide a safe, stable and reliable for internet connection by wireless network. The level of security varies in different organization by the way they use the network and the number of users in the organization. The most comment are needed to consider for Wi-Fi network securityContinue reading “Lab 12: Wi-Fi Access Point Security”
Lab 11: Firewall Rule Based Management
While visiting website, Hypertext Transfer Protocol (HTTP) is used to send and receive data from the server. The general port used for HTTP is port number 80. An extension version of HTTP is Hypertext Transfer Protocol Secure (HTTPS). The data during commutation is a encrypted to increase the security and usually using port number 443.Continue reading “Lab 11: Firewall Rule Based Management”
Lab 10: Implementing NAT and OpenSSH
Network Address Translation (NAT) translate internet address to private address. Because there are limited number of internet TCP/IP addresses, so many devices on the private network can use only one access point to connect to the internet. In this is setting, all the devices will have a single public IP address and usually the routerContinue reading “Lab 10: Implementing NAT and OpenSSH”
Lab 9: Managing Certificates
To maintain secure network connection, public key infrastructure (PKI) usually used to maintain the security of the data transfer by the network and very useful in many commerce areas such as e-commerce and internet banking and sending email. In the PKI involve different roles, software and digital certificates need to be created, distributed and storedContinue reading “Lab 9: Managing Certificates”
Lab 8 Understanding PKI Concepts
ANS1 What is the role of the Root CA and Subordinate CA in PKI? Public key infrastructure (PKI) is a two key encryption system for communication. All key is issued by a certificate authority (CA) and distributed to the user Root CA is stand for root certificate authority, who is a trusted party, their roleContinue reading “Lab 8 Understanding PKI Concepts”
Lab 7 Password cracking
Ans 1 Discuss how to use Cain & Abel to initiate a brute force attack. Cain & Abel is a software for cracking password in different system, such as windows, cisco etc. the software contains so many types of method to crack password, one of them is called Brute-force Attack. To perform brute force attack, userContinue reading “Lab 7 Password cracking”