It255 Lab 7 Encryption, Hashing, and Confidentiality

In: Computers and Technology

Submitted By Seabee67
Words 446
Pages 2
Lab 7 Windows Encryption and Hashing to Confidentiality & Integrity
Brett Reigel
ITT Technical Institute
IT 255
08/09/2012

Lab 7 Windows Encryption and Hashing to Confidentiality & Integrity 1. Which Key do you provide anyone you want to encrypt messages with private or public keys or both?
The public key is always provided as part of the handshake in order to encryption to take place. 2. What does GPG allow you to do once it is installed?
GPG allows you to encrypt your hard drives content in order to secure it. 3. Name 2 different types of encryption supported by GPG for your key?
The MD5 and Sha1 type of hashing encryption are supported by GPG. 4. What happens when you sign and trust a new key on your keychain?
A new key is created to include the private and public key based on how the new key was created. 5. If a user sends you a public key will he be able to decrypt your encrypted messages once you import and sign his key?
Both parties need to have each other private keys in order to be able to encrypt and decrypt all messages that is exchange among themselves. 6. What are the similarities between an MD5 hash and a fingerprint?
They both insert a fingerprint to the data. 7. How would you encrypt a webserver and the pages it serves up?
By setting the web server to redirect it’s web traffic to SSL hence encrypting all conversations between server and host in relation to the web traffic.

8. Why is hashing all database inputs not considered encryption of a database? What value does hashing database entries from server to client?
Hashing the input entries of a database is not considered encryption because the data in the database is still in a readable. Hash appends to the data as the fingerprint ensuring data integrity is still there. 9. Where would you remove a user’s certificate from being able to…...

Similar Documents

Lab Manual

...IT255 Student Lab Manual LABORATORY Student Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Student Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 Laboratory #1 ................................................................................................................................................ 7 Lab #1: Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) ............................................. 7 Learning Objectives and Outcomes.......................................................................................................... 7 Required Setup and Tools......................................................................................................................... 7 Deliverables ............................................................................................................................................ 11 Evaluation Criteria and Rubrics.............................................................................................................. 12 Lab #1 – Assessment Worksheet .................

Words: 19367 - Pages: 78

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms &......

Words: 4114 - Pages: 17

Lab 4 It255

... Describe two options you would enable in a Window’s Domain password policy? Minimum password length and password complexity requirements 4. Where would patch management and software updates fall under in security operations and management? Monitoring, Tracking, Testing 5. Is there a setting in your GPO to specify how many login attempts will lockout an account? Name 2 parameters that you can set to enhance the access control to the system. Account lockout duration and threshold 6. What are some Password Policy parameter options you can define for GPOs that can enhance the C-I-A for system access? Minimum password length, maximum password age, password must meet complexity requirements, and store passwords using reversible encryption 7. What sources you use as a source to perform the MBSA security state? Computer by Name or IP and multiple Computers by Domain or IP Range 8. What does WSUS stand for, and what does it do? Windows Server Update Service and it downloads Microsoft updates to a single server and deploys them 9. What is the difference between MBSA and Microsoft Update? MBSA scans for security vulnerabilities while Microsoft update checks the Microsoft database for available updates. They are two totally different tools. 10. What are some of the options that you can exercise when using the MBSA tool? You can check for Windows administrative vulnerabilities and for security updates...

Words: 293 - Pages: 2

Lab 1

...Assessment Worksheet 111 LAB #7 – ASSESSMENT WORKSHEET Relate Windows Encryption and Hashing to Confidentiality and Integrity Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only. Lab Assessment Questions & Answers 1. If you and another person want to encrypt messages, should you provide that person with your public 7 Relate Windows Encryption and Hashing to Confidentiality and Integrity key, private key, or both? You should both provide each other with your public keys. 2. What does GPG allow you to do once it is installed? GPG allows you to encrypt and decrypt data and generate public and private keys. 3. Name two different types of encryption supported by GPG for your key. GPG supports symmetric ciphers DES and Blowfish as well as asymmetric ciphers ELGamal and RSA. 112 LAB #7 | Relate Windows Encryption and Hashing to Confidentiality and Integrity 4. What happens when you sign and trust a new key to your keychain? A new private and public key is created with a fingerprint for non repudiation. 5. If a user sends you his/her public key, will he/she be able to decrypt your......

Words: 472 - Pages: 2

Lab 7 Fundementals of Cyber Security

...Assessment Worksheet 111 LAB #7 – ASSESSMENT WORKSHEET Relate Windows Encryption and Hashing to Confidentiality and Integrity Course Name and Number: CSIA301 Overview This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only. Lab Assessment Questions & Answers 1. If you and another person want to encrypt messages, should you provide that person with your public 7 Relate Windows Encryption and Hashing to Confidentiality and Integrity key, private key, or both? In theory you could, but I you are taking the time out to make in the encrypted messages I'm assuming you wouldn't want others to know, but I think you have to provide the person with both you need both to access the messages. 2. What does GPG allow you to do once it is installed? GPG is specifically a command line tool that enables you to encrypt and sign your data and communication and includes a key management system as well as access modules for all kind of public key directories. 3. Name two different types of encryption supported by GPG for your key. 112 LAB #7 | Relate Windows Encryption and Hashing to Confidentiality and Integrity 4. What happens when you sign and trust a new key to your......

Words: 442 - Pages: 2

Hashing & Encryption for Secure Communication

...Week 1 Lab: Implement Hashing & Encryption for Secure Communications Learning Objectives and Outcomes Upon the completion of this lab, students will be able to perform the following tasks: • Apply common cryptographic and hashing techniques on a message to ensure message confidentiality and integrity • Verify the integrity of the output of common cryptographic and hashing tools to determine whether an encrypted message is legitimate or whether it has been modified • Use and create an MD5 sum or SHA1 hash to generate a unique hash for data to assure the integrity of the data • Relate how a change to the data impacts the hash and why it is important to check the hash provided before executing or unzipping a binary or some other unknown file Assignment Requirements Watch the Demo Lab in Learning Space Unit 2 and then answer each of the following questions. Tasks: 1. Use the following encryption algorithms on the following message and record the result: “You Deserve an A”. You may use one of the readily available tools on the Internet to perform this encryption. Please provide the link (URL) of the tool you used. a. MD5: 02f3b84a0bdae954498783594c668541 b. SHA1: D44A86680D449581A82644C663F8B5C34DB6BBF1 c. Link: http://onlinemd5.com   2. Decrypt the following. You may use one of the readily available tools on the internet to perform this encryption. Please provide the link (URL) of the tool you used. a. MD5: ......

Words: 543 - Pages: 3

Implement Hashing and Encryption for Secure Communications

...Implement Hashing and Encryption for Secure Communications NaTasha Scott Dr. Jodine Burchell CIS 552 Cybercrime Techniques and Responses October 18, 2013 The MD5sum hash string for Example.txt 46edc6541babd006bb52223c664b29a3 The SHA1sum hash string for Example.txt a6f153801c9303d73ca2b43d3be62f44c6b66476 The MD5sum hash string for modified Example.txt 0e9687be578daf31a13ce42af48be3ac SHA1sum hash string for modified Example.txt 229beb78e69d5bd2f789edb6396277536f1459bb Briefly expalin why this change occurred and how it could be useful to a security analyst verifying the file. The reason why the change occurred because I have altered the Example.txt file, causing it's hash string to change. It is useful to a security analyst because he or she will know if the data has been either altered or tampered with. GPG Keys for the student account [pic] GPG Keys for the instructor account [pic] When I tried to do the GPG keys for the instructor something went wrong and I was not able to get any results like I did with the student account. I did this twice and still no results that were supposed to be there except for “permission denied”. I even followed the steps on the manual as well. It was becoming a great experience and lab exercise and I was really enjoying it until this part. Lab 2 Assessment Questions and Answers 1. Compare the hash values......

Words: 1138 - Pages: 5

Implement Hashing and Encryption for Secure Communications

...1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified. They change to keep authentication and integrity. 2. Why are the MD5sum and SHA1sum hash values the same every time you calculate for the “example.txt” sample fi le? What if they were different when you re-calculated the hash value at the other end? These are the same to verify authentication and integrity. If they don’t match the data has been compromised. 3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity? They could use digital signatures in the email. 4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet? They can use digital signatures along with cryptography. 5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why? MD5sum is a one-way has function that has a 128 bit has for the input. SHA1sum processes up to 512 and adds padding. Sha1sum is better because padding is added to ensure the right numbers. 6. Where can you store your public keys or public certificate fi les in the......

Words: 411 - Pages: 2

Week 1 Lab: Implement Hashing & Encryption for Secure Communications

...Week 1 Lab: Implement Hashing & Encryption for Secure Communications 1. Use the following encryption algorithms on the following message and record the result: “You Deserve an A”. You may use one of the readily available tools on the Internet to perform this encryption. Please provide the link (URL) of the tool you used. a. MD5: _02f3b84a0bdae954498783594c668541 _ b. SHA1: _d44a86680d449581a82644c663f8b5c34db6bbf1 _ c. Link:_ http://www.md5hashgenerator.com/index.php / http://www.sha1-online.com/ Decrypt the following. You may use one of the readily available tools on the internet to perform this encryption. Please provide the link (URL) of the tool you used. d. MD5: 0cbc6611f5540bd0809a388dc95a615b Result:_______ MD5: Test___________ e. SHA1: 640AB2BAE07BEDC4C163F679A746F7AB7FB5D1FA Result ______SHA1: Test ________ f. Link:_ http://www.md5decrypter.co.uk/sha1-decrypt.aspx \ http://www.md5decrypter.co.uk/ 2. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity? Digital Signature 3. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet? A VPN. 4. What is the difference between MD5sum and SHA1sum hashing......

Words: 435 - Pages: 2

Lab 7

...private or public keys or both? The public key is always provided as part of the handshake in order to encryption to take place. 2. What does GPG allow you to do once it is installed? GPG allows you to encrypt your hard drives content in order to secure it. 3. Name 2 different types of encryption supported by GPG for your key? The MD5 and Sha1 type of hashing encryption are supported by GPG. 4. What happens when you sign and trust a new key to your keychain? A new key is created to include the private and public key based on how the new key was created. 5. If a user sends you his public key will he be able to decrypt your encrypted messages once you import and sign his key? Both parties need to have each other private keys in order to be able to encrypt and decrypt all messages that is exchange among themselves. 6. What are the similarities between an MD5 hash and a fingerprint? They both insert a fingerprint to the data. 7. How would you encrypt a webserver and the pages it serves up? By setting the web server to redirect it’s web traffic to SSL hence encrypting all conversations between server and host in relation to the web traffic. 8. Why is hashing all database inputs not considered encryption of the database? What value does hashing database entries from server to client? Hashing the input entries of a database is not considered encryption because the data in the database is still in a readable. Hash appends to the data as the......

Words: 291 - Pages: 2

Labs

...ISSC362 Week 1 Lab #2: Implement Hashing and Encryption for Secure Communications Instructor Name: ________________ Lab Assessment Questions 1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified. 2. Why are the MD5sum and SHA1sum hash values the same every time you calculate for the “example.txt” sample file? What if they were different when you re-calculated the hash value at the other end? 3. 2 4. 3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity? 4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet? 5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why? 6. Where can you store your public keys or public certificate fi les in the public domain? Is this the same thing as a public key infrastructure (PKI) server? 7. What do you need if you want to decrypt encrypted messages and fi les from a trusted sender? 8. What encryption mechanisms are built into Microsoft® Windows XP Professional? 9. Which Windows encryption......

Words: 296 - Pages: 2

Is418 Lab 7 & 8

...Week 4 Lab This lab consists of two parts: Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 7 and Unit 8 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part #1 Apply Hardened Security for the Linux Kernel Learning Objectives and Outcomes Upon completing this lab, students will learn about the following tasks: * Review and tune the kernel parameters on a Fedora Core Linux Server for security and monitoring purposes * Produce kernel versions and loaded options for a better understanding of how the system is configured and to identify potential security vulnerabilities in the Fedora Core Linux Server * Edit /etc/sysctl.conf file and adjust tcp_sysncookies settings to configure secure options for users on a Fedora Core Linux Server * Review and assess the Loaded Kernel Modules (LKM’s) of the target Linux system and provide recommendations on the output and current running configuration * Use and interpret the lmod command output and perform security hardening configurations on the Fedora Core Linux Server Overview This lab is an extension of the previous hands-on labs. This lab continues with the system and security hardening for the Fedora Core Linux Server. In this lab the students need to review and security harden the Linux kernel with security parameters. They......

Words: 1460 - Pages: 6

Assessing and Securing Systems on a Wan and Applying Encryption and Hashing Algorithms for Secure Communications

...Unit 1 Individual Project Danielle Hunker Ethical Hacking Colorado Technical University Online CSS280 February 22, 2016 Assessment Worksheet Assessing and Securing Systems on a Wide Area Network (WAN) Course Name and Number: Ethical Hacking CSS280 Student Name: Danielle Hunker Instructor Name: Jimmy Irwin Lab Due Date: February 22, 2016 Overview In this lab, a systems administrator for the securelabsondemand.com network has reported odd behavior on two servers that support legacy applications you first conducted internal penetration tests (also called a vulnerability scan) on each system and then helped secure those systems by configuring firewalls and removing vulnerable open ports. Lab Assessment Questions & Answers 1. What is the first Nmap command you ran in this lab? Explain the switches used. Nmap command: nmap –O –v 10.20.100.50 -O was the switch used to detect the operating system 10.20.100.50 -v was the switch used to show the detail of 10.20.100.50 2. What are the open ports when scanning 192.168.3.25 and their service names? * 80 HTTP services * 135 Microsoft EPMAP (End Point Mapper) * 139 NetBios session service * 445 Microsoft DS, SMB file sharing and CIFS (common internet file sharing) * 3389 RDP (Remote Desktop Protocol) * 5357 WSDAPI web services for devices * 49152 uo to 49157 DCOM or ephemeral ports 3. What is the command line syntax for running an SMB vulnerability......

Words: 832 - Pages: 4

Itt Lab 7 Lab Doc

...LLC. NOT FOR SALE OR DISTRIBUTION Lab #7 - Assessment Worksheet Using Encryption to Enhance Confidentiality and Integrity Course Name and Number: _____________________________________________________ john schenberger Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you learned how cryptography tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. You used Kleopatra, the certificate management component of GPG4Win, to generate both a public and private key as both a sender and a receiver. You used the sender’s keys to encrypt a file, sent it to the receiver, and decrypted it using the receiver’s copy of the keys. Lab Assessment Questions & Answers 1. If you and another person want to encrypt messages, should you provide that person with your public key, private key, or both? The public key is the only key that I will share with another person as part of the handshake in order of the encryption take place. 2. What does Kleopatra allow you to do once it is installed? Kleopatra allow you to encrypted messages, files and text with a private key. 3. What key type was used to create the certificate on Kleopatra? What other types of encryption key types are possible? Kleopatra......

Words: 285 - Pages: 2

It255: Unit 7 Select Appropriate Encryption Algorithms

...Instructions: Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements. Common encryption algorithms and methods:  Data Encryption Standard (DES)  Rivest, Shamir, and Adleman (RSA) encryption algorithm  Triple DES  Diffie-Hellman key exchange  International Data Encryption Algorithm (IDEA)  El Gamal encryption algorithm  Carlisle Adams and Stafford Taveres (CAST) algorithm  Elliptic curve cryptography (ECC)  Blowfish  Secure Sockets Layer (SSL)  Advanced Encryption Standard (AES)  Digital signature Scenarios: 1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Select an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation. 2. Top Ads is a small advertising company consisting of 12 computers that have Internet access. All employees communicate using smartphones. Top Ads' primary concern is protecting the data on the smartphones. Select an encryption solution that best protects the smartphones and justify the recommendation. 3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. All employees......

Words: 401 - Pages: 2

Trolls: The Beat Goes On! | Cisdem PDF Manager Ultimate 3.0.0 | Download APK