0% found this document useful (0 votes)
17 views13 pages

Lab 1

Uploaded by

Jermong Sosi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views13 pages

Lab 1

Uploaded by

Jermong Sosi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

LAB ACTIVITY 1 OUTPUT

IT181 CYBERSECURITY

Module 2: Securing Operating System.


Name: Sosa, Jermaine Isaiah B
Section: AM1
Instruction: Based on the secure operating system module(pdf), screenshot your
work and answer corresponding questions listed below. Watch Module 2 Part 2 as
guide for you to answer this activity.
Save this file as : surname_lab1(pdf) and send it in the week 2 link (CSCU Lab 1)

1. Lock the System When Not in Use


Q: What is the importance of locking the system when not in USE?

A: Locking your system helps prevent unauthorized individuals from accessing your computer
and its contents. This is particularly important in shared or public environments where multiple
people might have physical access to your device.

2. Create Strong User Password


Q: Describe a STRONG password.

A: A strong password is at least 12-16 characters long, includes a mix of upper and lower case
letters, numbers, and special characters, avoids common words and patterns, and is unique for
each account.
3. Disable the Guest Account: Windows 7

Q: What are functionalities of a Guest Account in Windows? When not in use, why is it
important to disable guest account?

A: A Guest Account in Windows allows temporary users to log in without having access to the
main user's files and settings, providing limited access to the system. It's important to disable
the Guest Account when not in use to prevent unauthorized access and potential security
vulnerabilities, as guest accounts have fewer restrictions and can be exploited by malicious
users.

4. Lock Out Unwanted Guests in Windows 7


5. Rename the Administrator Account in Windows 7

6. Disable Start-Up Menu in Windows 7


7. Adding New Programs in Windows Firewall in Windows 7
8. Enable BitLocker in Windows 7

Need windows 11 pro to enable bitlocker

9. Disabling Unnecessary Services in Windows 7


Q: Give one scenario where you’d disable a process in your OS.

A: If it is consuming an excessive amount of system resources, such as CPU or memory, and is


causing the system to become slow or unresponsive.

10. Finding Open Ports Using Netstat Tool

Q: What is a port? Describe its importance in identifying security threat?

A: A port is a communication endpoint in a computer network, identified by a number, that


allows the system to differentiate between different types of network traffic. Ports are crucial
in identifying security threats because they can indicate which services or applications are
running and potentially exposed to vulnerabilities; monitoring and managing open ports helps
in detecting unauthorized access and preventing attacks such as port scanning, which is
commonly used by attackers to find exploitable services.
11. How to Hide Files and Folders?

12. Disable Simple File Sharing in Windows 7


13. Raise the UAC Slider Bar in Windows 7

Q: What are the different options in the UAC slidebar?

A: "Always Notify" which alerts you for all changes, "Notify me only when programs try to make
changes to my computer" which notifies you for program changes but not for Windows
settings, "Notify me only when programs try to make changes to my computer (do not dim my
desktop)" which is similar but without dimming the desktop, and "Never Notify" which disables
notifications entirely and is not recommended due to security risks.
14. Windows Security Tools: Keepass Password Safe Portable

(Keepass not yet used)


Q: What is the benefit of using KeePass?

A: The benefit of using KeePass is that it securely stores and manages all your passwords in an
encrypted database, protecting them from unauthorized access, and allows you to use strong,
unique passwords for each account without having to remember them all.
15. Windows Firewall

Q: List down features of the host-based Windows Firewall.


1. A: Inbound and Outbound Filtering: Controls both incoming and outgoing network
traffic to and from the computer.

2. Rule-based Filtering: Allows the creation of rules based on program, port, IP address,
and protocol to manage network access.

3. Stateful Inspection: Monitors the state of active connections and determines which
network packets to allow through the firewall.

4. Integration with Windows Security Center: Provides centralized management and


monitoring of firewall settings and alerts.
5. Logging and Auditing: Records and tracks security events related to network activity for
analysis and troubleshooting.
6. Granular Control: Offers detailed control over the types of network traffic allowed,
including specific application permissions.
7. Network Profiles: Configures different settings for private, public, and domain networks
to enhance security based on the network environment.
8. IPsec Integration: Supports IPsec for secure communications over IP networks.

9. Notifications: Alerts users to network activity that requires attention or action.

10. Group Policy Management: Allows administrators to manage firewall settings across
multiple computers in a network using Group Policy.

You might also like