Cyber Security Lab Record
Cyber Security Lab Record
(LAB-RECORD)- SEM-III
UNIT-I & II
1. Check List for reporting in cyber-crime at Cyber-crime police Station
Mandatory Information
Optional/Desirable Information:
The online portal where a victim can file a cyber crime complaint is https://cyber
crime.gov.in/Accept.aspx, an initiative of Government of India that caters to complaints pertaining
to the online Child Pornography (CP), Child Sexual Abuse Material (CSAM) or sexually explicit
content and other cyber crimes such as social media crimes, online financial frauds, ransomware,
hacking, crypto currency crimes, and online cyber trafficking. The portal also provides an option of
reporting an anonymous complaint about reporting Child Pornography (CP) or sexually explicit
content. One can follow below-mentioned steps to report a cyber crime online –
STEP 5: Register your mobile number and fill in your name and State.
What phishing
Phishing is an attempt to steal personal information or break in to online accounts using deceptive
emails, messages, ads, or sites that look similar to sites you already use. For example, a phishing
email might look like it's from your bank and request private information about your bank
account.
What they want are account numbers, passwords, Social Security numbers, and other
confidential information that they can use to loot your checking account or run up bills on
your credit cards. In the worst case, you could find yourself a victim of identity theft. With
the sensitive information obtained from a successful phishing scam, these thieves can take
out loans or obtain credit cards and even driver's licenses in your name. They can do
damage to your financial history and personal reputation that can take years to unravel.
But if you understand how phishing works and how to protect yourself, you can help stop
this crime.
institution offers electronic account access, periodically review activity online to catch
suspicious activity.
UNIT- III
5. Basic Check list, privacy and security settings of popular Social media
Platforms.
Use a VPN
Virtual Private Network is an encryption tool. If you want to keep your conversations, messages,
and calls secure this is the best solution.
Never use the same password for multiple websites because they will all become compromised.
Internet is Permanent
Always consider that anything you post stays there forever. Even if you delete your account,
someone may already print/copy your content.
Personal Information
Careful who you reveal personal information. Always be suspicious of anyone who asks for your
personal information over any social media platform.
Keep checking your emails regularly. If you get a suspicious login attempt to your account, change
your password as soon as possible.
Don’t save passwords in your browser because if your system gets compromised your passwords
can be easily read.
App Authorization
Every time you log in to another site using the option of using a social media login you are granting
authorisation to your account.
They tell you what data this app will have access to before you agree but if you stop using that site
remember to revoke authorisation.
Password Manager
Your passwords are valuable, so treat them that way.
There is a number of password manager software available that help you store and organise
passwords. This enables you to log in with just one main password that then allows you to access
all your accounts.
Reporting abusive content: Users can report content that they find abusive, offensive, or
in violation of platform policies. These reports are reviewed by the help centre.
Reporting CSAM (Child Sexual Abuse Material): CSAM content can be reported to
platform help centre. Social media platforms have stringent policies in place to address
such concerns and ensure a safe digital environment for everyone, including children.
Reporting Misinformation or Fake News: With the proliferation of misinformation online,
users can report content that they find or suspect misleading or false information and Fact-
checking bodies are employed to assess the accuracy of reported content.
Content violating intellectual property rights: If there is a violation or infringement of any
intellectual property work, it can be reported on the platform.
Violence of commercial policies: Products listed on social media platforms are also needed
to comply with the platform’s Commercial Policies.
Background:
The Digital India programme has now become a movement which is empowering common Indians
with the power of technology. The extensive spread of mobile phones, Internet etc. has also
enabled many social media platforms to expand their footprints in India. Common people are also
using these platforms in a very significant way. Some portals, which publish analysis about social
media platforms and which have not been disputed, have reported the following numbers as user
base of major social media platforms in India:
Avoid using common passwords or easily guessable combinations like birth dates or phone
numbers.
1. Protect and memorize your passwords. Never write your passwords down or share them
with anyone. Change passwords regularly and use combinations of letters, numbers and
"special characters" such as the #, @, ), ? Signs. Do not use your Social Security Number or
birthday as a username or password. Never use your username as a password.
2. Keep your computer operating system up to date. If your computer is older than five
years, its operating system may not offer the same level of protection as newer systems.
System manufacturers provide frequent updates to help make your system more secure.
Regularly check for updates from your system manufacturer.
3. Use a current web browser. Cathay Bank continually upgrades our online services to
provide you with the most secure online services. We do not allow access to Cathay Online
Banking or Cathay Business Online Banking using browsers that do not meet our security
criteria. If you have problems accessing our online banking services, you may need to
upgrade your browser.
4. Install a personal firewall. Firewalls provide additional protection for your home
computer. Many operating systems come with firewall protection. Before purchasing a
firewall, check your operating system.
5. Antivirus and Antispyware Software. Virus and Spyware protection software helps reduce
the risk of contracting computer malwares (viruses and spyware) that can compromise
your computer and personal security while online.
6. Use secure websites for transactions and shopping. Make sure the web page you are
viewing offers encryption of your data. If you see a lock symbol in the lower right-hand
corner of your browser window, or if the web address of the page you are viewing begins
with https://, this indicates that web page is secure and uses encryption. Cathay Bank
provides 2048-bit encryption, the highest level available today.
7. Do not open e-mail or download programs from unknown sources. Sometimes hidden
programs or viruses are contained in e-mail or on downloaded programs which can
compromise your computer. Use caution when downloading from an unfamiliar site.
8. Terminate the Internet when not in use. Take an additional precaution by terminating
your Internet session when not in use. This will help to avoid unwanted access to your
computer and its data.
UNIT- V
9. Setting, configuring and managing three password policy in the computer (BIOS,
Administrator and Standard User)
1. Protect your laptop with BIOS passwords. A BIOS password is the extremely strong password
that locks up the hardware and makes the laptop completely unusable. Only logging with the
password can you enter into the operating system.
2. Create a BIOS password. Restart the laptop, and press F2 continuously to the following
interface. Select the security with the cursor and choose "Set User" password or "Set User
Password".
Note: The difference between Set User Password and Set Supervisor Password: User
password controls access to the system at boot; supervisor password controls access to the
setup utility.
3. Press Enter, and fill the three blanks with your password.
4. Press Enter and pop up Setup Notice, which means that you have reset BIOS password.
5. Press F10 to save it and select Yes to exit, your laptop will log on automatically.
6. Ensure a reset. It is challenging if you forget a BIOS password. Rest the BIOS password using
standard BIOS backdoor passwords to reset BIOS password. A backdoor is one of the best
way to protect BIOS password which is provided for users to access the BIOS when the
hardware is being maintained. Note that some types of backdoor passwords will cease to
work when entering the wrong password for more than three times. Here are some well-
known backdoor passwords:
7. Protect your laptop with Windows Password. A Windows password is the confirmation
code that a PC user requesting access to the Windows system is really that particular user.
Create an administrator password with which the owner can log on in to the Windows
system. And then you can create a Windows password reset disk.
10. Setting and configuring two factor authentications in the Mobile phone.
Set up your mobile device to use a text message as your verification method
1. On the Additional security verification page, select Authentication phone from the Step 1:
How should we contact you area, select your country or region from the drop-down list,
and then type your mobile device phone number.
2. Select Send me a code by text message from the Method area, and then select Next.
3. Type the verification code from the text message sent from Microsoft into the Step 2:
We've sent a text message to your phone area, and then select Verify.
4. From the Step 3: Keep using your existing applications area, copy the provided app
password and paste it somewhere safe.
5. Select Done.
1. On the Additional security verification page, select Authentication phone from the Step 1:
How should we contact you area, select your country or region from the drop-down list,
and then type your mobile device phone number.
2. Select Call me from the Method area, and then select Next.
3. You'll receive a phone call from Microsoft, asking you press the hash tag (#) sign on your
mobile device to verify your identity.
4. From the Step 3: Keep using your existing applications area, copy the provided app
password and paste it somewhere safe.
Patch management creates a centralized process for applying new patches to IT assets. These
patches can improve security, enhance performance, and boost productivity.
Security updates
Security patches address specific security risks, often by remediating a particular vulnerability.
Hackers often target unpatched assets, so the failure to apply security updates can expose a
company to security breaches.
Feature updates
Some patches bring new features to apps and devices. These updates can improve asset
performance and user productivity.
Bug fixes
Bug fixes address minor issues in hardware or software. Typically, these issues don't cause security
problems but do affect asset performance.
Minimizing downtime
Most companies find it impractical to download and apply every patch for every asset as soon as
it's available. That's because patching requires downtime. Users must stop work, log out, and
reboot key systems to apply patches.
Regulatory compliance
Under regulations like the General Data Protection Regulation (GDPR), the Health Insurance
Portability and Accountability Act (HIPAA), and the Payment Card Industry Data Security Standard
(PCI-DSS), companies must follow certain cybersecurity practices. Patch management can help
organizations keep critical systems compliant with these mandates.
For location, camera, and microphone permissions, you may be able to choose:
All the time: For location only. The app can use the permission at any time, even when
you’re not using the app.
Allow only while using the app: The app can use the permission only when you're using
that app.
Ask every time: Every time you open the app, it'll ask to use the permission. It can use the
permission until you’re done with the app.
Don't allow: The app cannot use the permission, even when you’re using the app.
A computer antivirus is a software tool that is developed to detect, remove, or prevent computer
viruses and other malware from a computer and similar devices. This software kind usually spends
some time scanning for any patterns or behaviour that may be done by a malicious code like a
virus, worm, Trojan, or ransomware.
Antivirus protection is the program helping us to fulfil the aim of keeping our devices safe from
viruses, malware, and ransomware. Such harmful software can be very dangerous, it can just
infect our computers and steal our personal information, corrupt files, or completely devastate a
designated device and make it unusable.
1. On the Navigation pane, click Configure > Security > Anti-Virus to visit the Anti-Virus page.
2. Click New.
3. In the Anti-Virus Rule Configuration dialog, type the name into the Rule name box.
4. After the Binding zone option, select a security zone for the Anti-Virus rule from the
Available list, and click to add to the selected list.
5. Specify a protection type. If Predefined is selected, you need to specify a security level for
the protection in the Security level section. The default level is Medium. If User-defined is
selected, you need to specify the file types and protocol types, as well as the actions that
will be taken if any virus has been detected
A firewall plays a vital role in network security and needs to be properly configured to keep
organizations protected from data leakage and cyber attacks.
This is possible by configuring domain names and Internet Protocol (IP) addresses to keep the
firewall secure. Firewall policy configuration is based on network type, such as public or private,
and can be set up with security rules that block or allow access to prevent potential attacks from
hackers or malware.
Proper firewall configuration is essential, as default features may not provide maximum protection
against a cyberattack.
Securing a firewall is the vital first step to ensure only authorized administrators have access to it.
This includes actions such as:
Some firewalls can be configured to support other services, such as a Dynamic Host Configuration
Protocol (DHCP) server, intrusion prevention system (IPS), and Network Time Protocol (NTP)
server. It is important to also disable the extra services that will not be used.
With the configurations made, it is critical to test them to ensure the correct traffic is being
blocked and that the firewall performs as intended.
6. Manage firewall continually
Firewall management and monitoring are critical to ensuring that the firewall continues to
function as intended. This includes monitoring logs, performing vulnerability scans, and regularly
reviewing rules.
Mobile devices are very subjective tools, mainly used to facilitate routine operations, but they also
serve to store very confidential personal knowledge and data. Mobile security is the safety and
protection of smartphones, tablets, laptops and other portable devices, and the systems they
connect to, from threats and vulnerabilities linked with wireless computing.
BYOD: As enterprise users are permitted advanced admittance/access from individual mobiles
gadgets like smartphones and tablets are efficiently substituting desktops for numerous business
duties.
The Internet of Things (IoT): With the numerous kinds of smart devices, they cannot constantly be
supervised by customers or antivirus software’s. This makes IoT systems an attractive objective for
invaders who make use of them as entry points to the bigger network.