CS Lab Manual
CS Lab Manual
D)
EXERCISE – 1
Aim: Audit security policy implementation in
windows environment.
Page | 1
Procedure:
Step 1: Click on the search bar in windows
(available below in left side) and type Event
Viewer and click Enter.
Page | 2
Page | 3
Page | 4
Page | 5
EXERCISE – 2
Aim: Create a Demilitarized zone creation in
Network environment for information security
Page | 6
Procedure:
Creating a Demilitarized Zone (DMZ) is a
fundamental step in enhancing information
security within a network environment. A DMZ is a
network segment that is isolated from both the
internal network (trusted zone) and the external
network (untrusted zone), serving as an
intermediary area where you place services that
need to be accessible from the internet. Here's a
step-by-step guide to creating a DMZ:
6. Host Placement:
- Deploy servers and services in the DMZ based
on their required accessibility.
- For example, place web servers directly in the
DMZ, while database servers may be placed in a
more restricted zone within the internal network.
7. Security Hardening:
- Apply security best practices to harden servers
and services within the DMZ.
13. Documentation:
- Maintain detailed documentation of the DMZ
configuration, firewall rules, and security policies.
- Document procedures for managing and
maintaining the DMZ environment.
EXPERIMENT - 3
Aim: Implement resource harvesting attack and
Page | 11
mitigation
Procedure:
Credential harvesting is the immediate goal of
most cybercrime in which attackers seek users’
login information. The strategy is to build a large
enough cache of credentials so that they can sell
them or exert pressure on the individuals or
companies impacted by their loss.
Account takeover
Credential stuffing
Lateral movement and escalation of privilege
Other forms of broken authentication
Page | 14
Keystroke logging (keylogging): These are
programs that attackers place on victims’
computers to track every keyboard input. Then,
they analyze the results to reveal credentials.
Page | 15
There are also potential legal and compliance
consequences to these attacks. If the leaked or
compromised data is subject to industry or
governmental regulations, then the organization
could lose its certification or face monetary and
other noncompliance penalties.
Page | 16
Encryption across all credentials so that even
stolen assets are unintelligible to attackers.
Phishing-resistant multi-factor
authentication
Multi-factor authentication (MFA) is an
improvement on baseline single-factor systems
such as traditional password-based authentication.
Rather than requiring a single set of stealable or
guessable assets, such as a username and
Page | 17
The best MFA systems require a possession factor
or inherence factor—something the individual
owns, such as a device, or something the user is,
such as a biometric scan of their iris, face,
fingerprint, etc.
EXERCISE - 4
Page | 19
Aim: Implement Window Patch management
policy.
Procedure:
Certainly! Implementing a Windows Patch
Management Policy involves a combination of
tools, processes, and communication strategies.
Here's a step-by-step practical guide:
Step 4: Testing
Step 5: Deployment
6.1 Monitoring:
- Use monitoring tools to track the status of
Page | 22
patch deployments.
- Set up alerts for failed deployments or issues.