Академический Документы
Профессиональный Документы
Культура Документы
A REPORT
LAB 3.11A
FILE INTEGRITY TESTING WITH HASH-MD5SUMMER
Generating Hash Values with MD5summer
2
PRINCIPLES OF INFORMATION SECURITY
3
PRINCIPLES OF INFORMATION SECURITY
4
PRINCIPLES OF INFORMATION SECURITY
5
PRINCIPLES OF INFORMATION SECURITY
6
PRINCIPLES OF INFORMATION SECURITY
3.11B
FILE INTEGRITY CHECKING WITH FILEVERIFIER++
7
PRINCIPLES OF INFORMATION SECURITY
8
PRINCIPLES OF INFORMATION SECURITY
Step 9:
There are 4 differences as following:
The first one is the original status is valid but actual is invalid.
The second one is that the actual size is 53 bytes but the original is 0 bytes
The third one is that the actual modification time is 3/26/2019 2:56:42 AM but the
original modification time is 3/26/2019 2:42:42 AM
The last difference is actual Hash Value fdb6 but the original Hash Value is 0000
9
PRINCIPLES OF INFORMATION SECURITY
LAB 3.12A
LOG SECURITY ISSUES WITH CLIENT VIEWER
10
PRINCIPLES OF INFORMATION SECURITY
The system error items are bowser, Service Control Manager, DNS Client Events.
The system warning items are hcmon, iaStorA
11
PRINCIPLES OF INFORMATION SECURITY
LAB 3.12B
LOG SECURITY ISSUES WITH MMC
13
PRINCIPLES OF INFORMATION SECURITY
14
PRINCIPLES OF INFORMATION SECURITY
15