Вы находитесь на странице: 1из 15

PRINCIPLES OF INFORMATION SECURITY

A REPORT

Prepared by: NGUYÊN THI HOAI THU

A student from: MIS2016A

Student ID: 16071309

Prepared for: NGUYEN DAI THO

March 26, 2019


1
PRINCIPLES OF INFORMATION SECURITY

LAB 3.11A
FILE INTEGRITY TESTING WITH HASH-MD5SUMMER
Generating Hash Values with MD5summer

Figure 3.11-1 at step 2

2
PRINCIPLES OF INFORMATION SECURITY

Figure 3.11.2 at Step 4

Figure 3.11-3 at step 6

3
PRINCIPLES OF INFORMATION SECURITY

Figure 3.11-4 at step 8


Step 9:
There are 5 files that were found in my directory.

4
PRINCIPLES OF INFORMATION SECURITY

Validating Hash Values with MD5summer

Figure 3.11-5 at step 3

Figure 3.11-6 at step 5

5
PRINCIPLES OF INFORMATION SECURITY

Figure 3.11-7 at step 6

6
PRINCIPLES OF INFORMATION SECURITY

3.11B
FILE INTEGRITY CHECKING WITH FILEVERIFIER++

Figure 3.11-8 at step 1

7
PRINCIPLES OF INFORMATION SECURITY

Figure 3.11-9 at step 4

Figure 3.11-10 at step 6

8
PRINCIPLES OF INFORMATION SECURITY

Figure 3.11-11 at step 8

Step 9:
There are 4 differences as following:
The first one is the original status is valid but actual is invalid.
The second one is that the actual size is 53 bytes but the original is 0 bytes
The third one is that the actual modification time is 3/26/2019 2:56:42 AM but the
original modification time is 3/26/2019 2:42:42 AM
The last difference is actual Hash Value fdb6 but the original Hash Value is 0000

9
PRINCIPLES OF INFORMATION SECURITY

LAB 3.12A
LOG SECURITY ISSUES WITH CLIENT VIEWER

Figure 3.12-1 at step 1


Step 2:
The application error items are VSS, Msinstaller, .NET Runtime, CAPI2, Office
2016 Licensing Service
The application warning item is User Profile Service.

10
PRINCIPLES OF INFORMATION SECURITY

Figure 3.12-2 at step 3


Step 6:
The security error item is Microsoft window security auditing
There is no security warning items.

The system error items are bowser, Service Control Manager, DNS Client Events.
The system warning items are hcmon, iaStorA

11
PRINCIPLES OF INFORMATION SECURITY

LAB 3.12B
LOG SECURITY ISSUES WITH MMC

Figure 3.12-3 at step 1

Figure 3.12-3 at step 2


12
PRINCIPLES OF INFORMATION SECURITY

Figure 3.12- 5 at step 3

Figure 3.12-6 at step 6

13
PRINCIPLES OF INFORMATION SECURITY

Figure 3.12-7 at step 7


Step 8:
Some of the events listed in the Security logs are:
 SeAssignPrimaryTokenPrivilege
 SeTcbPrivilege
 SeSecurityPrivilege
 SeTakeOwnershipPrivilege
 SeLoadDriverPrivilege
 SeBackupPrivilege
Step 9:
My current settings for the maximum log size is : 20480 KB
Step 10:
One day is log events are overwritten

14
PRINCIPLES OF INFORMATION SECURITY

Figure 3.12-8 at step 11

15

Вам также может понравиться