Lab3

In: Computers and Technology

Submitted By rex099
Words 279
Pages 2
56

Lab #3 | Configure BitLocker and Windows Encryption

LAB #3 – ASSESSMENT WORKSHEET

Configure BitLocker and Windows Encryption
Course Name and Number:
IS3340 Windows Security

Student Name:
Daniel Longo

Instructor Name:
Dakrouni

Lab Due Date:
10/4/2013

Overview
In this lab, you used the Microsoft® Encrypting File System (EFS) to encrypt files and folders on a Windows Server 2008 machine. You documented the success or failure of your encryption efforts. You also installed Microsoft® BitLocker Drive Encryption, a data protection feature that is used to resist data theft and the risk of exposure from lost, stolen, or decommissioned computers. You encrypted a data drive on the server and created a recovery key.

Lab Assessment Questions & Answers
1. Within a Microsoft® Windows 2008 server R2 environment, who has access rights to the EFS features and

functions in the server?

2. What are some best practices you can implement when encrypting BitLocker drives and the use of

BitLocker recovery passwords?

38542_Lab03_Pass2.indd 56

3/2/13 10:01 AM

Assessment Worksheet
3. What was the recover key created by BitLocker in this lab?

57

4. BitLocker secured drives. How would you grant additional users access rights to your EFS encrypted

folders and data files?

5. What are the main differences between EFS and BitLocker?

6. The customer privacy data policy in your company’s data classification standard requires encryption in

3
Configure BitLocker and Windows Encryption

two places: data stored in a user’s personal data folders and data stored on the LAN’s shared disk drives. Describe your solution for meeting this policy requirement.

38542_Lab03_Pass2.indd 57

3/2/13 10:01 AM

38542_Lab03_Pass2.indd 58

3/2/13 10:01 AM…...

Similar Documents

Comp 220 Lab 3

...COMP 220 Lab3 go to following address to get complete lab http://homeworkfox.com/tutorials/computer-science/4604/comp-220-week-3-ilab-3-of-7-inheritance/ | i L A B  O V E R V I E W | | Scenario and Summary | | This lab introduces you to writing a C++ program to implement the concept of class inheritance using different types of bank accounts as a model. In this lab, you will create a base class, called CBankAccount, and two additional classes (each derived from CBankAccount), called CSavingsAccount and CCheckingAccount. You will then test the operations of each class in function main() to simulate the transactions of both a checking account and a savings account. Deliverables | 1. Submit a single Notepad file containing the source code for all the files of the lab to the Dropbox for Week 3. Your source code should use proper indentation and be error free. Be sure that your last name and the lab number are part of the file name: for example, YourLastName_Lab3.txt. Each program should include a comment section that includes (minimally) your name, the lab and exercise number, and a description of what the program accomplishes. 2. Submit a lab report (a Word document) containing the following information to the Dropbox for Week 3.  * Include your name and the lab or lab-exercise number. * Specification: Include a brief description of what the program accomplishes, including its input, key processes, and output. * Test......

Words: 1394 - Pages: 6

Nt2580 Lab3

...50 Lab #3 | Enable Windows Active Directory and User Access Controls LAB #3 – ASSESSMENT WORKSHEET Enable Windows Active Directory and User Access Controls Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview This lab provides students with the hands-on skills needed to create a new Active Directory domain in Windows Server 2003 and demonstrates how to configure a centralized authentication and policy definition for access controls. The Active Directory users and workstation plug-ins will be used to create users, groups, and configure role-based access permissions and controls on objects and folders in a Windows Server 2003 Active Directory system. Lab Assessment Questions & Answers 1. What two access controls can be set up for Windows Server 2003 folders and authentication? Authentication and Access control. 2. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured? List Folder Contents 3. What is the Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access? Group Policy Editor 38351_LB03_Pass2.indd 50 26/02/13 11:54 PM Assessment Worksheet 51 4. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data. creates security......

Words: 431 - Pages: 2

My Paper on Things and Stuff

...Workstation Admins – adds the Server Admins, Domain Admins, and Faculty security groups to the Administrators group on all machines in the Workstations OU (can adjust depending on who client would like to have admin access) Internet Explorer Settings – Applies IE managed settings to all machines in the Workstations OU. Currently empty, can discuss what options should be managed. WorkstationDisplay – locks desktop background and screen saver, enables screen saver, sets screensaver timeout to 10 and requires password on resume. Applied to all devices in Workstations OU Lab1Printers, Lab2Printers, Lab3Printers – Automatically maps the printers in the corresponding lab, setting printer 1 as the primary. Applies to devices in Lab1, Lab2, and Lab3 OU, respectively. (currently points to printers using following naming structure: \\PrintSrv01\Lab1Printer1 \\PrintSrv01\Lab3Printer2 , can fix path to reflect actual names) Enabled group policy loopback on all User Configurations to be applied to OUs based on user account. Additional GPOs can be added after discussing with client....

Words: 409 - Pages: 2

Gang Street

...REFERENCES 1) http://chemed.chem.purdue.edu/genchem/lab/equipment/pipet/error.html 2) http://www.indiana.edu/~nimsmsf/P215/p215notes/LabManual/Lab3.pdf 3) http://www.biochem.duke.edu/wysiwyg/downloads/GrimsleyPace.pdf 4) http://www.clinchem.org/content/21/6/776.full.pdf INTRODUCTION Basic Laws of Light Absorption. For a uniform absorbing medium (solution: solvent and solute molecules that absorb light) the proportion of light radiation passing through it is called the transmittance, T, and the proportion of light absorbed by molecules in the medium is absorbance, Abs. Transmittance is defined as: T = I/Io where: Io= intensity of the incident radiation entering the medium. I = intensity of the transmitted radiation leaving the medium. T is usually expressed as percent transmittance, %T: %T = I/Io x 100 The relationship between percent transmittance (%T) and absorbance (A) is given by the following equation: A = 2-log (%T) On most spectrophotometers two scales are present, %T and Abs. Absorbance has no units (Why?) and varies from 0 to 2 (linear region for most substances is from 0.05 to 0.7). The Beer-Lambert Law states that Abs is proportional to the concentration (c) of the absorbing molecules, the length of light-path through the medium and the molar extinction coefficient: A = εcl where: ε = molar extinction coefficient for the absorbing material at wavelength in units of 1/(mol x cm) c =......

Words: 376 - Pages: 2

Stewart Netsecurity Lab3

...Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? on 172.30.0.1 port 23 is using telnet port 22 is using ssh on 172.30.0.200 port 23 is using telnet as well port 22 is using ssh Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). The good guys (practitioner) are using nmap to make their network safer. The network management team uses nmap to identify unknown IP addresses that appear in reports or in a network analysis trace. The security team uses nmap to scan the internal network for a specific open port that might help to identify the extent of a spyware infestation. The bad guys (hackers) are already using nmap for reconnaissance, because a single scan can tell you a lot about the open doors and windows in a computer's house. 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. -T4 -A Turn on OS and version detection scanning script (IPv4) -v verbosity options, you can gain information about the remote operating system -PE Standard ICMP Echo Request -PS send SYN packets instead of ACK packets for your TCP Ping 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. -A Turn on OS and version......

Words: 509 - Pages: 3

Lab 1

...Damian Suba Lab3 1. Within a Microsoft Windows 2008 Server R2 environment, who has access rights to the EFS features and functions in the server? Only users that have rights to encrypt file systems certainties and have rights to encrypt and decrypt but this is not a default thing, these rights would have to be given to them. 2. There are three modes of access control that Bitlocker can enable on drives. List these three modes. Three modes that run on Bitlocker are: TPM, PIN, and USB 3. What feature and function can you enable to mitigate the risk caused by USB thumb drives moving confidential data to/from a USB hard drive? You can be able to use either a USB key/password or smartcard, via windows prompts and it should encrypt the data. 4. What are some best practices you can implement when encrypting BitLocker drives and the use of Bitlocker recovery passwords? For encrypting BitLocker drives and the use of Bitlocker recovery passwords, Windows will ask where you would like to save a recovery key and it gives you some options which are:   Save to USB flash drive, a file, or print the recovery key. 5. What encryption algorithm is supported BitLocker? The main encryption algorithm is asymmetric algorithm, secure hash algorithm or elliptic curve cryptography could be used to. 6. What is the Trusted Platform Module (TPM) within Bitlocker and how does this verify the integrity of the Workstation Domain and laptops boot process? TPM within Bitlocker is microchip to......

Words: 336 - Pages: 2

Lab3

...Name ____Anjad itayem______________ Projectile Motion Go to http://phet.colorado.edu/simulations/sims.php?sim=Projectile_Motion and click on Run Now. Pre Lab Reflections: What are the • What forces are at play on a body under fall ? gravity and air resistance • Make a prediction of which angle results in maximum range. My prediction is that angel of 70 degrees will be the mazimum range Activity: - Open the sim, projectile motion. - Familiarize yourself with the variables shown there. - Ensure the air resistance check box remains unchecked. - Using the mouse set the angle of projection(i) to 5 deg. Alternatively enter the value in directly. - Set the initial speed to a value U=15m/s . - Click on Fire to start the projectile and record the corresponding value of the range R. - Repeat with values i= 10,15,20,25,30,35,40,45,50,60,70,75,80,85. - Draw a graph of Range (R) against Angle of projection (i) You may want your lay out to appear like in the table. U=……… |Angle (i) |Range(m) | |5 |9.7 | |10 |12.2 | |15 |14.9 | |20 |17.5 | |30 |21.8 | |35 |23.2 ...

Words: 404 - Pages: 2

Lab3

...1. What are the three fundamental elements of an effective security program for information systems? Three fundamental elements include Identification,Authentication and Authorization 2. Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources? the two major are Access Controls and Authentication. 2 3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured? Security policy is set to read only 4. What is the mechanism on a Windows server where you can administer granular policies and permissions on a Windows network using role-based access? the tool is Group policy editor 5. What is two-factor authentication, and why is it an effective access control technique? where two forms of identification are required such as a token or a card as well as a passcode this is effective because without both neither can be used. 6. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data. they both control access via controls to keep data confidential, integrious and available 7. Is it a good practice to include the account or user name in the password? Why or why not? No it is not it makes the password easy to guess. 3 | Lab 3: Enabling Windows Active......

Words: 335 - Pages: 2

Lab3

...LAB 3.2 3.1.2 Using Figure 3-1 define each layer of the OSI model in your own words and state what layer provides. Use your textbook or internet to support your answer. Physical – Device Data Link – Physical address Network – Path determination Transport – End to end connections Session – internet Presentation – typing data Application – games, downloads 3.2.2 Using Figure 3-2 as a basis, complete the diagram to show the intermediate encapsulation provided by each layer. Application Presentation Session | Data | Transport | Segment | Network | Packet | Data Link | Frame | Physical | Bit | 3.2.3 Briefly explain the deencapsulation steps in the communication from host B receiving a message from host A destined for an active application. First the receiving computer synchronizes with the digital signal by reading binary numbers. After synchronizing is complete and it gets the whole frame and passes it to the layer above it which is the Data Link layer. Second the Data Link layer will do a Cyclic Redundancy Check (CRC) on the frame. Checking for errors and then strip off any information or header which was put on by the remote systems Data Link layer and pass the rest to the Network layer. Third the Network layer checks the IP address and if it matches the Network layer header is stripped off from the packet and passed to the Transport layer. Fourth the Transport layer processes the segment......

Words: 347 - Pages: 2

Ip Subnetting Project

...Members of the sales and finance department have abused internet privileges. For assigning IP addresses you can pick any one from the following network addresses. 172.16.0.0/16 172.17.0.0/16 172.18.0.0/16 172.19.0.0/16 172.20.0.0/16 10.10.0.0/16 10.5.0.0/16 10.6.0.0/16 10.7.0.0/16 10.8.0.0/16 Fc00::/7   IP ADDRESSING TABLE Location Number of IP Addresses Required Address Block Assigned San Francisco 1290 172.16.0.0-172.16.7.255/21 Denver Region Denver Campus 441 Remote Office 1 28 Call Center 1 150 Remote Office 2 35 Houston Region Houston Campus 329 Remote Office 3 21 Call Center 2 135 Research and Development R&D IPv6 Lab1 600 R&D IPv6 Lab2 310 R&D IPv6 Lab3 90 Deliverables: Your paper should address the following XUMUC Network Issues. Addresses the issues described above. • Create VLAN, as appropriate, to minimize and Isolate broadcast traffic. • Reduce WAN Traffic • Develop a new IP scheme summarizing at points shown in the diagram The Assignment must comply with APA style and should contain: • Cover page • Index Page • Main Body (3 to 5 Pages) Not to exceed 5 pages of Main body • Executive summary • Technical details (including any assumptions) o Details that address all issues described above o Completed IP addressing table (including summarized routes for the Denver and Houston regions), o Updated network diagram and a conclusion. o Router or Switch Configuration......

Words: 526 - Pages: 3

Book Review

...system can be classified as suitable for the skating board selling because of its ability to integrate with updates. Files from the POS can be downloaded and updated on a new POS system. The POS also required very faint data massage for data entry and customization. This is proves its user friendliness especially with the seamless customization of the input data thus improving its suitability in skate board selling. Mail merge is one of the important factors in any POS. it gives the system the ability to track valued customers of a business. Mail merge allows the shop to appreciate its frequent customers by discounting their next purchases. This makes the proposed pos suitable for selling the skating boards. Other factors not covered by lab3 sheet evaluation like security, pricing and general reporting should also be considered to arrive at a better recommendation for the suitability of the POS system. Task 2 Alternative solutions are meant to ensure that the client settles on the best POS based on their quality and performance. The alternate solutions should offer different point of views for the POS, this diverse view allows the user to flex their decisions and go for what satisfies their requirements. Square is one of the alternative solutions for the POS. The Square POS is fully customized to integrate to existing hardware. One of the outstanding pros of square is that it accepts all common credit and debit cards. It also allows next day deposits. This means......

Words: 2915 - Pages: 12

Lab3

...ET1410 - Module 2 - Homework Wk3 Due: Beginning of Class Week 4 Student Name: _________________________ Instructions: This is a homework assignment that covers Week 3 of our ET1410 class. You should neatly show your steps in the middle column, and provide your final answer in the right hand column. NEATNESS COUNTS. You must work in pencil, not pen. Must include units of measure in your answer!!! If no units, or incorrect units, points will be deducted. ProblemNo. | Your Solution | Final Answer (Restate Your Final Answer Here) | 1 | The upper critical frequency of an op-amp’s open-loop response is 200 Hz. If the midrange gain is 175,000 what is: (a) ideal gain at 200 Hz? (b) the actual gain? (c) The op-amps open loop bandwidth? | (a)____________(b)____________(c)____________ | 2 | Determine the attenuation of an RC lag network with fc = 12 kHz for each of the following frequencies. (a) 1 kHz (b) 5 kHz (c) 12 kHz (d) 20 kHz (e) 100 kHz | (a)____________(b)____________(c)____________(d)____________(e)____________ | 3 | Determine the phase shift through the network at a frequency of 2 kHz: | | 4 | Determine the phase shift through the network at a frequency of 2 kHz: | | 5 | Determine the phase shift through the network at a frequency of 2 kHz: | | 6 | A certain op-amp has three internal amplifier stages with midrange gains of 30dB, 40dB, and 20dB. Each stage also has a critical frequency associated with it as follows: fc1=......

Words: 484 - Pages: 2

Cis 170 Lab 3

...Write report headingLoop as long as there are divers to process Input diver's name and city Initialize highest score, lowest score and total score Using a do-while loop input the 5 judge's scores Validate the score to ensure it is between 0 and 10 Add score to total Determine highest and lowest scores Input and validate the degree of difficulty Calculate the overall diver's score Display the diver's information and overall score Add diver's overall score to the final score Add 1 to the number of divers Prompt the user if she wants to process another diverEnd-LoopCalculate the average score for all diversDisplay the number of divers and the average score for all divers | Step 3: Create a New Project | Create a new project and name it LAB3. Write your code using the Processing Logic in Step 2. Make sure to save your program. | Step 4: Build Solution | To compile the program, click Debug then Build solution (F7). You should receive no error messages. If you see some error messages, check the code above to make sure you didn’t key in something wrong. Once you make your corrections to the code, go ahead and click Build >> Build Solution again. | Step 5: Execute the Program | Once you have no syntax errors, to execute or run your program, click Debug on the menu bar and then click Start Debugging. | Step 6: Capture the Output | 1. Capture a screen print of your output. (Do a PRINT SCREEN and paste into an MS Word document.) 2. Copy your code and......

Words: 1057 - Pages: 5

En1320 Lab3

...Alyssa Bauman En1320 Lab3 “Why We Crave Horror Movies” by Steven King presents an intriguing philosophy of watching horror movies. I believe that the purpose behind this article is to appeal to the reader’s unrealized dark side. King implies that are able to overcome their hysterical fear of things when they’re confronted with it and watching a horror movie is the easiest way to do that. He explains that in some way we all have this courage to overcome our deepest fears and one of the ways we show it is placing ourselves, in this case a movie theater, directly in front of what we know will scare us. The intended audience for this article is most likely the younger age demographic. Horror Movies are especially popular with ages 15-35. When you are younger you have this need to seek out new experience and thrills. Throughout the essay King directs a message to the young by making a comparison of horror movies to roller coasters describing the excitement that is felt throughout the ride. King is trying to persuade his reading audience to watch horror movies that bring his popularity up because he has books that have been made into movies. Although persuasive, King's article does not have factual evidence to solidify his argument that we all crave horror movies. The article uses many rhetorical strategies such as: compare and contrast, analysis and evaluation, cause and effect, absolutes, generalizations, and assumptions. King's ability to use these strategies......

Words: 373 - Pages: 2

Phys216 Lab3

...Worksheet for Interactive Lab3: Circular Motion Name _____________ Physics 216 Grade ___/42 Date ______ Circular motion is one of the fundamental building blocks for understanding the physical world because it is so common. This interactive lets you examine the basic ideas of kinematics and forces for objects moving in circular motion. 1. (6 points) Use the controls under Show Vectors to draw arrows for several different quantities. The velocity vector is drawn in a special way: a big, bold arrow showing its direction and magnitude, plus smaller arrows for its horizontal and vertical components. * How are the directions of the acceleration and force vectors related? Force has a magnitude and a direction, and it is a vector. If a force is applied to an object, the object will accelerate in proportion to the magnitude of the force and in the direction of the applied force * What about the directions of the velocity and force vectors? The velocity of the object changes in response to the application of force. * And how are they influenced by the increase in mass and velocity slide bars? This question can be answered by the equation F = ma or force equals the product of mass and acceleration. An increase in mass or acceleration will result in more force. 2. (6 points) The large slider on the left changes the angle at which you view the spinning system. Try watching the motion from above (the default) and from the side. What would the system look......

Words: 1008 - Pages: 5

Gautama Buddha | Hakase to Suraimu-chan | Série Animée VOST