Вы находитесь на странице: 1из 13

PRACTICAL-2

Aim: Configure a system for various Security experiments.


For security of the system or network there are many ways to secure the system, some are following
as under,

• Setting password in your system :-


We should set password so that unauthorized person can’t access a data and personal information about
the person.
The steps for setting password is given below::
Step-1:Go to the system settings, and select ACCOUNTS.

Step-2:After go in ACCOUNTS select on the SIGN-IN OPTIONS.


Step-3:After that click on the CHANGE THE PASSWORD.
Step-4:Then Microsoft ask you for the your previous password.

Step-5:After that Microsoft send a mail password on your E-mail id and then you can set your
password that you want to set.

• Firewall configuration: -
The steps for setting password is given below:
Step-1:Go to the system settings, and select NETWORK&INTERNET..

Step-2: after that select WINDOWS FIREWELLS.


Step-3: after that you can see 3 type of firewells.

Step-4: you can on the PRIVATE NETWORK by clicking.


You can also do that with DOMAIN NETWORK and PUBLIC NETWORK is given below :-
• Install antivirus software:-

• What is ANTIVIRUS: -
Anti-virus software is a software utility that detects, prevents, and
removes viruses, worms, and other malware from a computer. Most anti-virus programs include
an auto-update feature that permits the program to download profiles f new viruses, enabling
the system to check for new threats. Antivirus programs are essential utilities for any computer
but the choice of which one is very important. One AV program might find a certain virus or
worm while another cannot, or vice-versa.
Anti-virus software searches the hard drive and external media attached to a
computer for any potential viruses or worms. Broadly speaking, the two main approaches to virus
detection are:

• Dictionary Approach: The anti-virus software checks a file and automatically refers to a dictionary
of known viruses. If there is a match, the file is deleted, quarantined or repaired.
• Suspicious Behaviour Approach: The anti-virus software monitors the behaviour of all programs
and flags any suspicious behaviour. For example, a program might be flagged if it tries to change
settings to the operating system or write to a certain directory.

• Types of antivirus programs :-


Antivirus software is distributed in a number of forms, including
stand-alone antivirus scanners and internet security suites that offer antivirus protection, along with
firewalls, privacy controls and other security protections.
While some operating systems are targeted more frequently by virus
developers, antivirus software is available for most OSes:

• Windows antivirus software:-Most antivirus software vendors offer several levels of Windows
products at different price points, starting with free versions offering only basic protection.
Users must start scans and updates manually and typically free versions of antivirus software
won't protect against links to malicious websites or malicious attachments in emails. Premium
versions of antivirus software often include suites of endpoint security tools that may provide
secure online storage, ad blockers and file encryption.

• macOS antivirus software:- Although macOS viruses exist, they're less common than Windows
viruses, so antivirus products for macOS are less standardized than those for Windows. There
are a number of free and paid products available, providing on-demand tools to protect against
potential malware threats through full-system malware scans and the ability to sift through
specific email threads, attachments and various web activities.

• Android antivirus software :- Android is the world's most popular mobile operating system and
is installed on more mobile devices than any other OS. Because most mobile malware targets
Android, experts recommend all Android device users install antivirus software on their
devices. Vendors offer a variety of basic free and paid premium versions of their Android
antivirus software including anti-theft and remote-locating features.
Step-1 :- If you purchased the antivirus program from a retail store, insert the CD or DVD into the
computer's disc drive. The installation process should start automatically, with a window opening to
help guide you through the install process.
--Run the Avast Setup File (Installer) and Select Installation Type
Step-2:-Actual Avast Installation Process:
During the second step, you actually do not have to do anything. You can just sit and watch the progress
bar show Avast being downloaded, creating a system restore point, and the Avast files being copied
onto your computer. The installation process will take around 2-3 minutes, depending on your Internet
connection, but you can use your computer and do any other activity.

Step-3:-Avast Installation Finished :


now you should have Avast antivirus 2019 completely installed on your computer. In the last step just
click on ‘Continue ‘and finish the installation process.
• Use a VPN:

 What is VPN: -
a VPN (virtual private network) is a security solution that grants users secure
and private access to the internet. It accomplishes this by redirecting data through an
anonymous server designed to hide the sensitive user information.
 How Does a VPN Work?
To understand how VPNs work, it would be best to first take a good look at what happens during a
standard connection to the internet and its inherent flaws:
While the above graphic might seem to be an oversimplification, the idea that you are basically leaving
sensitive data “out in the open” is fairly accurate. There are no safeguards for whatever information you
are sending online. This means that anyone who knows what they are doing can simply swoop in and
grab your sensitive information: personal data, passwords, credit card numbers; you get the picture.

The internet is home to millions of servers, with each one responsible for hosting one or several websites
(shared servers). These servers transmit data to users that need access to them as well as talk and share
information with other servers. This arrangement works well for accessing and sharing information over
the internet quickly and efficiently but not so much when it comes to privacy.

Now, if you are simply surfing the web as a leisure activity and not doing anything particularly
important, then there is no reason to worry. However, if you are dealing with data that is potentially
valuable (online banking information, business emails, online transactions, and the like), then you will
want to consider using an added layer of protection, which is precisely what a VPN offers.

 How can a VPN Hide an IP Address?


Here are the basics of what changes when you add a VPN to the mix:
As you can see from the graphical representation above, VPN users are encrypting their data, which
can only be read by the VPN server and vice-versa. The VPN server is the one interacting with the
internet on the user’s behalf, which explains its privacy and security benefit.

Simply put, the destination server will see only the VPN server as the source of the data request,
which, in turn, hides the real IP address of the VPN user. The process is designed in such a way that it
is extremely difficult (if not impossible) for outsiders to pinpoint specific users as the source of any
online activity. Any data intercepted between the user and the VPN server is heavily encrypted and
practically useless to third parties.

 Steps for installing a VPN: -


Step-1: Download your desired VPN: -
Navigate to the website for your desired VPN. You should see a download button on the homepage, or
a link in the page’s navigation bar for downloading. Click the download button and follow the prompts
to download the version for your operating system.
Step-2: Install your VPN Software: -
Once you have downloaded your VPN software to your computer, locate the downloaded file.
Open it and follow the prompts to install and start. Some VPNs like CyberGhost are ready to use right
away without creating an account. Other VPNs require you to sign up with an email address.

Step-4: Launch your VPN software: -


Once you have downloaded and installed your VPN, it’s time to start it up. Locate your application
from your Applications folder, Taskbar, or desktop/home screen.
Step-5: Run your VPN: -
Now you can begin running your VPN to protect your identity, access protected files on a network, or
access websites and content not available in your country. You can also change your settings to allow
your VPN to launch automatically and connect to a random network, or you can choose when and how
you connect.

• Turn on the windows Defender:


 What is Windows Defender:
Windows Defender is a software application that safeguards a
system from malware. It was an anti-spyware program built to fight unauthorized access and protect
Windows computers from unwanted software. Introduced with the Windows Vista installation pack, it
is now available for free download as part of Microsoft Security Essentials.
Windows Defender was previously known as Microsoft AntiSpyWare.

 Steps for turn on the windows defender: -


Step 1: Click “Settings” in the “Start Menu”. And then choose “Update & Security”.
Step 2: Select “Windows Security” from the left pane and choose “Open Windows Defender Security
Canter”.

Step 3: Open Windows Defender’s settings, and then click on the "Virus & Threat Protection settings"
link.
Step 4: Click the Real-Time Protection, Cloud-Delivered Protection and Automatic Sample
Submission switches to turn Windows Defender off.

• Access Control:
 What is access control:
Access control is a way of limiting access to a system or to physical or virtual resources. In
computing, access control is a process by which users are granted access and certain privileges
to systems, resources or information.
In access control systems, users must present credentials before they can be granted access. In
physical systems, these credentials may come in many forms, but credentials that can't be
transferred provide the most security.

 Steps for turn on the Access control: -


Step 1: In the “Start Menu”, search “CONTROL PANEL”.
Step 2: Click Change User Account Control settings in the search results.

Step 3: Then do one of the following:

• To turn UAC off, drag the slider down to Never notify and click OK.
• To turn UAC on, drag the slider up to the desired level of security and click OK.

Step 4: You may be prompted to confirm your selection or enter an administrator password.
Step 5: Reboot your computer for the change to take effect.