can't find your donut ?? lets search

for msbte curriculams first please see this page carefully http://www.msbte.com/website/curriculum/

IMPORTANT

If you are MSBTE diploma third year student of computer branch co,cm,if,cd plesae subscribe to my blog by email.. by link given below

Showing posts with label cs. Show all posts
Showing posts with label cs. Show all posts

windows hardening CS paper

<>Use a Non-Administrator Account

Windows ships with the Administrator account and Guest account by default. A password is not required to log-on. At least 60% of the machines I encounter in both home and business environments are running this way. Many current exploits are written to find and attack machines set up this way. Connected to the Internet and running as Administrator, an exploit is capable of:

  • Install any start services

  • Install AxtiveX controls, including IE and shell add-ins (common to both adware and spyware)

  • Install kernel-mode rootkits and keyloggers (hard to impossible to detect)

  • Access data belonging to all users on the machine

  • Cause code to run whenever anyone logs on to the computer (including capturing user names and passwords entered in the
    Ctrl-Alt-Delete logon dialog

  • Replace normal OS and program files with Trojan horses

  • Disable or even uninstall anti-virus programs

  • Cover its tracks in the event log to avoid detection

  • Access any other computer you are also Administrator on and gain control of those computers as well

  • The list goes on and on

Rename the Administrator account, and then password-protect it. Then, set up a limited account for yourself and all other users of the computer as well. Remember to use a password for the new accounts. Use the limited accounts for all general computing needs,
especially Internet and email uses. Never use the Administrator account unless it is necessary (Install or un-install programs, Windows updates etc.).

In some business environments, this can cause a problem because some everyday applications require Admin account privileges to run properly. Why you ask? Because in many cases it is easier to write a program this way. If you have program that needs Admin privileges
to run properly, you will have no choice, but I recommend pressuring the software vendor for a newer version being developed that will
run with a limited user. If enough users do this, the vendors will begin to respond rather than loose business.

If it helps you make the decision whether or not to take this step, remember that an exploit written to use Admin privilege is stopped
from installing, running or executing if you are a limited user.

The built-in administrator account and administrator group has the greatest number of default permissions and privilege as well as the ability to change their permissions and privileges. The object is to prevent an intruder from gaining control over the computer and administrator rights from the built-in Administrator account. To accomplish this, we will rename the Administrator account, change its description, and Password-protect it.

<>Renaming and password protecting the Administrator account

Windows 2000 computers:

  1. Right click on ‘My Computer’ then click on ‘Manage’, which opens the Microsoft Management console.

  2. Expand the “Local Users and Groups”, and open the ‘Users’ folder

  3. Right click on ‘Administrator’, then click ‘Properties’ and type in the new name for the account. Then, change the description so
    it no longer indicates it is the built-in account for administering the computer/domain.

  4. Left click on ‘OK’.

  5. Right click the newly named account, click ‘Set Password’ and type in and confirm the new password for the account.

Windows XP Pro computers:

  1. Right click on ‘My Computer’ then click on ‘Manage’, which opens the Microsoft Management console.

  2. Open the Users folder under Local users and groups, right click on ‘Administrator’ and click ‘Rename’ and type in the new name
    for the account.

  3. Right click the newly named account, click ‘Properties’ and change the description for the account so as not to reveal its true
    nature.

  4. Click on ‘OK’

  5. Right click on the new ‘Administrator’ account, and click ‘Set Password’.

  6. Click ‘Proceed’ in the message box

  7. Type in and confirm the new password for the account in the boxes and then click ‘OK’

<>Use Strong Passwords

I really can’t stress this enough, especially for business use. Please, do not pick a pet name, spouse name or anything else easily
guessed by people who know you.

Pick a password at least 8 characters long. I prefer 15 or more characters. Windows will accept a maximum of 127 characters.
Use both upper and lower case letters, numbers, and try to use characters as well. If you have multiple computers, do not repeat the
same passwords on each one. Never write down passwords and leave them in plain sight, or send them in email.

It is very scary to me to sit at a workstation that has all the account names, login names and passwords written on post-its and stuck on
the monitor. In a business environment, this is just inviting misuse.

The easiest way to pick a long, effective password is to think of an easy to remember phrase. Then change the letter o to the number 0, and all letter l to number 1. For example:

I like Tootsie-Roll becomes: I1iket00tsie-R011. Much harder to break that. Also, remember that Windows will accept spaces as a
password character.

<>Use a BIOS and Bootlevel Password

Once you set a Boot level BIOS password, it will be required every time the system is started. The system is completely disabled until
the password is entered. This is normally accomplished by selecting the password option in the BIOS setup. You may also want to
consider an additional password for accessing the BIOS settings in order to prevent unauthorized changes in the BIOS settings.

<>Use the Screensaver

Proper use of the screensaver will help protect your computer while you are away from it for short periods of time. This is especially important in business environments. Just bring up the screensaver settings and enable password protection. Here's how:

  1. Right click an open area of the desktop

  2. Left click properties from the choices

  3. Left click the screensaver tab

  4. Check the box to “On resume, password protect”

On Windows 2000 machines, left click the Power button, then left click the advanced tab, then check the box to “Prompt for password
when computer goes off standby”.

Remember to pick a time period for the screensaver to start, perhaps 10 minutes. If you are going to be away for an unknown time
period, you can always start the screensaver manually when you are called away. Another quick way to secure things is to simply hit
Ctrl-Alt-Delete which brings up the task manager. You then select ‘Lock Computer’ by left clicking the button, or hitting ‘Alt-k’ on the keyboard.

<>Guest Account

The guest account is known to exist on all Windows 2000 Server, Windows 2000 Professional, and Windows XP computers. Microsoft recommends against disabling the Guest account in Windows XP or removing it in either Win2k or XP. For more security of this account,
I recommend the following.

Windows 2000 computers:

Rename Guest account, password protect it, then disable it. Here's how:

  1. On the desktop, right click on ‘My Computer’ then click on ‘Manage’, which opens the Microsoft Management console.

  2. Expand the “Local Users and Groups”, and open the ‘Users’ folder

  3. Right click on ‘Guest’ then click ‘Rename’ and type in the new preferred name

  4. Right click on ’Guest’ then click ‘Properties and check to box ‘Account is disabled’. Also check the box for ‘User cannot change password’. Then type in the new full name, and change the description of the account as well.

Windows XP Pro computers:

  1. Right click on ‘My Computer’, then click ‘Manage’ which opens the Microsoft Management Console.

  2. Open the Users folder under Local users and groups, right click on ‘Guest’ and click ‘Rename’ and type in the new name for the account.

  3. Right click on ‘Guest’, click properties and edit the description for the account so its true nature will not be revealed.

<>Use NTFS File system

When Windows XP or Windows 2000 is installed, it should be installed on a separate partition formatted with the NTFS File system
rather than the older FAT File system. The NTFS system allows you to configure which users have access to which data, who can
perform what kinds of operations, and allows you to encrypt files and data.

<>Disable auto-logins

Do not use any automated logins and be sure all users are password protected. Go to the control panel, click on administrative tools,
click local security policy. Make sure all users have a password set for the account. I also recommend having only one administrator
account on each machine.

<>Limit unnecessary accounts

Limit any unnecessary or unused accounts and remember, I recommend only one administrator account per machine. If you see
accounts that are not needed, or not used, delete them.

<>Disable Enumeration of SIDS

Even after renaming Guest and Administrator accounts, an intruder armed with the right software can still find the real account by enumerating the account SIDs (Security Identifiers) because renaming an account does not change its SID. Once an account name has been identified (an attacker is looking for an Administrator account here) a brute force attack on the password is usually the next step.
This can be avoided by not allowing the enumeration of Account SIDs.

On a Windows XP machine, follow these steps:

  1. Click Start, go to Control Panel, click administrative tools, and click local security policy.

  2. Click the ‘Security Options’ folder in the left pane

  3. Double click ‘Network access: Do not allow anonymous enumeration of SAM accounts and shares’ on the right pane.

  4. Choose ‘Enabled’ and then click ‘Apply’ and ‘OK’ to save your settings.

On a Windows 2000 machine, follow these steps:

  1. Click Start, go to control panel, click administrative tools, and open ‘Local Security Policy’

  2. Click on + on the ‘Local Policies’ folder in the left pane

  3. Left click ‘Security Options’ folder under local policies

  4. Right click on ‘Additional restrictions for anonymous connections’ in the right pane

  5. Left click ‘Security…’ from the box that opens

  6. Under local policy setting, click the down arrow at the right end of the window and choose (left click) ‘Do not allow enumeration
    of SAM accounts and shares’

  7. Left click ‘OK’ to save your settings, and exit all windows

<>Disable File and Print Sharing

If you are not connected to a domain, simplified file sharing is automatically enabled in Windows XP. It should be noted here that simple
file sharing cannot be turned off in Windows XP Home Edition. Why disable print and file sharing? Well, if you use an always-on
high-speed Internet connection, leaving these services turned on is like leaving your doors open when you are not at home. Unless it is absolutely necessary, I recommend you turn these services off.

In Windows XP, follow these steps:

  1. Click Start, then go to settings, then click Control Panel

  2. Double click Internet Options.

  3. Click on the ‘Connections’ tab, select your connection, and then click ‘Settings’

  4. Click ‘Properties’, click the ‘Networking’ tab, and then uncheck the box for ‘File and Printer Sharing for Microsoft Networks’.

  5. Click ‘OK’ to save the settings

While you are here, let’s do one more thing, and choose not to save temporary Internet files:

  1. Left click on the Advanced tab of Internet Properties

  2. Scroll down to ‘Security’ at the bottom of the window, and check the box to ‘Empty Temporary Internet Files when browser is
    closed’

  3. Click ‘OK’ to save the settings, and exit the control panel

On Windows 2000 machines, use the following steps:

  1. Click Start, then go to settings, then click Control Panel

  2. Double click ‘Network and Dial-up Connections’

  3. Right click ‘Local Area Connection’ and choose ‘Properties’

  4. From the box that opens, uncheck ‘File and Print Sharing for Microsoft Networks’

  5. Click ‘OK’ to save the settings

To choose not to save Temporary Internet Files:

  1. In the Control Panel, open Internet Options

  2. Left click on the Advanced tab of Internet Properties

  3. Scroll down to ‘Security’ at the bottom of the window, and check the box to ‘Empty Temporary Internet Files when browser is
    closed’

  4. Click ‘OK’ to save the settings, and exit the control panel

<>Unhide File Extensions

By default, Windows XP and Windows 2000 hides known file extensions to simplify displays. The problem with this is that a malware
writer can hide a file extension type after the file display and keep you from knowing what kind of file you are about to open. This is especially true for files hiding Trojans. Let’s not let this happen for most file types.

On both Windows XP and Windows 2000, follow these steps:

  1. Click Start, go to settings, open the Control Panel, and double click ‘Folder Options’

  2. Left click the ‘View’ tab

  3. Uncheck the box for ‘Hide extensions for known file types’

There are still three known file extensions that will remain hidden even after the above procedure. They are .shs, .pif, and .lnk so if in doubt, the rule should be not to open or run the file. The file extensions on my personal banned list are: .exe .dll .ocx .wav .jpeg .gif
.bat .com .cmd .pif .scr .zip .mime .mim .uue .uu .b64 .bhx .hgx .xxe .doc .vbs .ico .bmp .ani .cur .hlp .upm .shs .lnk. I never open any
of these unless I am specifically expecting them.

<>Disable Remote Assistance and Remote Desktop

This applies to Windows XP machines only. Remote assistance allows you to invite another person to logon to your machine for remote troubleshooting. I recommend you leave it disabled. You can always re-enable it later if the service is ever needed. Remote desktop is available on XP Professional and allows you access to a Windows session on one computer while you are at another computer in
another location, not only over a LAN, but over the Internet as well.

To disable these functions, follow this procedure:

  1. Click Start, go to settings, then Control Panel

  2. Double click on the System icon

  3. Click on the ‘Remote’ tab, and uncheck the boxes to ‘Allow Remote Assistance invitations to be sent from this computer’, and
    ‘Allow users to connect remotely to this computer’

  4. Click ‘Apply’ to save the settings, and close the windows.

<>Disable any unnecessary and potentially dangerous service

The three most common services to turn off are Windows Plug and Play, DCOM, and Windows Messenger. I have been using PC’s for
"over twenty years now and cannot imagine a situation where any of these services are needed. I have never used any of them, but
many a malware writer has. The easiest way to disable these services is to use very small programs from Steve Gibson, of Gibson Research Corporation.

To disable Windows Plug and Play, go here:

http://www.grc.com/unpnp/unpnp.htm

To disable Windows DCOM, go here:

http://www.grc.com/dcom/

To disable Windows Messenger, go here:

http://www.grc.com/stm/shootthemessenger.htm

All three of these programs are freeware and are a very small file size.

<>Encrypt the My Documents and Temp folders

Both Windows XP and Windows 2000 allow you to encrypt selected data files and folders in your computer. By doing this, even if your computer is compromised by an attacker, you have an extra layer of security for your most used files by denying access to anyone
except the user that encrypted the files to begin with.

In Windows XP computers, follow this procedure:

  1. Open Windows Explorer

  2. Right click the folder you want to encrypt, and then click ‘Properties’

  3. On the ‘General’ tab, click ‘Advanced’

  4. Check the box to ‘Encrypt contents to secure data’

  5. Click ‘OK’ to save your settings

In Windows 2000 computers, follow this procedure:

  1. Right click “start” and then choose ‘Explore’

  2. In the left pane, right click the folder you want to encrypt, then left click ‘Properties

  3. Left click ‘Advanced’

  4. Left click the box to ‘Encrypt contents to secure data'

  5. Click ok to save your settings, and close open windows.

I recommend that you encrypt at least the following two folders:

1. ‘My Documents’ that contains the personal files in which most Microsoft Office documents are stored.
2. ‘Temp’ folder that contains the files created by most applications programs

<>Registry changes

The last few suggestions I have involves changes to the system registry. If you are at all squeamish about this, I suggest you stop your Windows hardening efforts at this point, or get help from someone that is familiar with registry edits and changes. If you elect to
proceed, I strongly suggest you do a system state backup before making any changes to the registry.

<>Clear Page File at System Shutdown

Default settings allow process memory files to be paged to the hard disk in clear text form at shutdown. Although this allows more
rapid recovery of this information the next time the system is started, it’s a great place for an intruder to look for any sensitive
information, and it is displayed in plain text form.

To clear the Page File at shutdown, follow this procedure:

  1. Click Start and go to settings and open the Control Panel

  2. Open ‘Administrative Tools, and choose ‘Local Security Policy’ followed by ‘Local Policies’ in the left pane, and then ‘Security
    Options’

  3. In the right pane, right click on ‘Clear virtual memory pagefile when system shuts down’ , left click ‘Security’, and choose
    ‘Enabled’

  4. Left click ‘OK’ to save your settings, and close all open windows.

<>Disable dump file creation

When Windows stops unexpectedly as the result of a Stop Error (“blue screen of death” or system crash), a Memory.dmp file is
created and it can be helpful when using debugging tools and software. Like the page file above, it can contain sensitive information and
passwords displayed in plain text form. I have never found this information of much use, but an intruder can definitely make use of it. To disable the dump file creation, follow this procedure:

  1. Click on Start, go the settings, and open the Control Panel

  2. Double click the ‘System’ icon and then click the ‘Advanced’ tab

  3. Click the ‘Startup and Recovery button, and look for ‘Write Debugging Information’ toward the bottom of the window (XP users
    will have to first click on ‘Settings’)

  4. Click on the down arrow at the right of the top window. Default setting is Small Memory Dump (64 KB). Choose ‘(none)’

  5. Click ‘OK’ to save your settings and close all open windows.

<>Disable Dr. Watson dump file creation

Another memory dump file similar to the ones above is created by Dr Watson. This is a program error debugger that gathers all kinds
of information about your computer when a user error or user-mode fault occurs within a program. I have never found these files to be useful either. To stop creation of these files, follow this procedure:

  1. Go to start, then run, then type in ‘regedit.exe’ and hit ‘Return’

  2. Browse to the following location in the left pane:

HKEY_LOCAL-MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AeDebug

  1. Left click on the value ‘Auto’ on the right pane, and change the value from ‘1’ to ‘0’

  2. Close the registry editor.

To delete the dump files created by Dr Watson on earlier occasions, you will have to delete them manually with this procedure:

  1. Open Windows explorer

  2. Browse to C:\Documents and Settings\All Users\Application Data\Microsoft\Dr Watson and delete files named User.dmp and Drwtsn32log.

<>The Scrap File danger

A scrap file is used by Windows machines to transfer data between programs, and it can contain just about anything from data to an executable program. Remember that in our discussion of file types, we chose to uncheck the box to ‘Hide known file extension types’ to show all file extensions and that I told you three file types would still remain hidden, one of them being .shs?

Herein lies the danger. A scrap file can be renamed with a different file extension to make it look benign. Windows assigns
‘RUNDLL32.EXE SHSCRAP.DLL, OPENSCRAP_RUNDLL %1’ to the .SHS extension by default. When the file is opened, Windows will unpack the scrap file and open or execute whatever is in the file. Once the scrap file is opened, you have absolutely no control over it. The trick here is to get the file to show its true .shs extension. To do this, we need yet another registry edit by following this procedure:

  1. Go to ‘Start’, ‘Run’ and then type in “regedit.exe’

  2. Left click ‘Edit’, then ‘Find’, and type in: HKEY_CLASSES_ROOT\ShellScrap and click ‘Find’

  3. Once found, in the right pane, right click on ‘NeverShowExt’ and choose ‘Modify’

  4. Type in ‘AlwaysShowExt’ and hit ‘Return’

  5. Close the Registry Editor

  6. Complete shut-down and re-boot

CS IMP. DATA VLAN AND PATCH

A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the Broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network switch. Network reconfiguration can be done through software instead of physically relocating devices.

VLANs are created to provide the segmentation services traditionally provided by routers in LAN configurations. VLANs address issues such as scalability, security, and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization, and traffic flow management. By definition, switches may not bridge IP traffic between VLANs as it would violate the integrity of the VLAN broadcast domain.

This is also useful if one wants to create multiple Layer 3 networks on the same Layer 2 switch. For example if a DHCP server (which will broadcast its presence) were plugged into a switch it would serve anyone on that switch that was configured to do so. By using VLANs you easily split the network up so some hosts won't use that server and default to Link-local addresses.

Virtual LANs are essentially Layer 2 constructs, compared with IP subnets which are Layer 3 constructs. In a LAN employing VLANs, a one-to-one relationship often exists between VLANs and IP subnets, although it is possible to have multiple subnets on one VLAN or have one subnet spread across multiple VLANs. Virtual LANs and IP subnets provide independent Layer 2 and Layer 3 constructs that map to one another and this correspondence is useful during the network design process.

By using VLAN, one can control traffic patterns and react quickly to relocations. VLANs provide the flexibility to adapt to changes in network requirements and allow for simplified administration
................
.......................
......................
................

A patch is a small piece of software designed to fix problems with or update a computer program or its
supporting data. This includes fixing bugs, replacing graphics and improving the usability or performance.
Though meant to fix problems, poorly designed patches can sometimes introduce new problems.

Patch management is the process of using a strategy and plan of what patches should be applied to
which systems at a specified time.

Patches sometimes become mandatory to fix problems with libraries or with portions of source code for
programs in frequent use or in maintenance. This commonly occurs on very large-scale software projects,
but rarely in small-scale development.

In open source projects, the authors commonly receive patches or many people publish patches that fix
particular problems or add certain functionality, like support for local languages outside the project's locale.

If a patch is a piece of data used to update a software product,
then a security patch is a change applied to an asset to correct the weakness described by a vulnerability.
This corrective action will prevent successful exploitation and remove or mitigate a threat’s capability
to exploit a specific vulnerability in an asset.

Security patches are the primary method of fixing security vulnerabilities in software.
Currently Microsoft releases their security patches once a month, and other operating systems and
software projects have security teams dedicated to releasing the most reliable software patches as soon
after a vulnerability announcement as possible. Security patches are closely tied to responsible disclosure.

computer security 20 marks and 80 mark MSBTE third year fifth semester co,cm,cd,if CO/cd/cm/if SAMPLE question paper CS ,

Sample Test Paper-I
Course Name : Computer Engg. Group
Course Code : CM/CO/IF
Semester: Fifth
Subject: Computer Security
Marks: 20
Time: 1 Hrs

Q.1 Attempt any TWO.---------08 Marks
a. State and Describe Security goals.
b. Describe piggy backing and Shoulder Surfing
c. Describe cryptography and cipher text

Q.2 Attempt any THREE.---------12 Marks
a. “I am Third Computer Engineering student studying in 6th semester” convert it
into cipher text using double transposition method.
b. What is digital Certificate and how it can be used for authentication?
c. What is Access control? List the method of access control and describe the one
which is mostly used now days
d. What attack? List different type of attack? Describe the attack which includes
zombies as agent of attack.





Sample Test Paper-II
Course Name : Computer Engg. Group
Course Code : CM/CO/IF
Semester: Fifth
Subject: Computer Security
Marks: 20

Q.1 Attempt any TWO.-------08 Marks
a. What is Firewall? List Different type of fire wall.
b. What is intruder? Describe Intruder Detection System.
c. Describe Virtual Private network.

Q2. Attempt any THREE.--------12 Marks
a. List Different Email Protocols and describe any one in detail.
b. Draw SSL architecture and Describe How to secure Socket Layer.
c. Describe Hierarchical Trust Model.
d. What is Hardening and describe it related to Unix / Linux system.



Sample Question Paper
Course Name : Computer Engg. Group
Course Code : CM/CO/IF
Semester: Fifth
Subject: Computer Security
Marks: 80
Time: 3 Hrs.

Q.1 Attempt any FOUR. --------16 Marks

a. List and Describe basic components of computer security.
b. List the step in verifying authencity and integrity of the digital certificate.
c. Describe the of denial of service attack with help of diagram.
d. What is IP security? Describe Authentication Header mode of IP security.
e. With the neat diagram describe network intrusion system mechanism.
f. What does encryption means? Describe shiif cipher encryption technique.

Q.2 Attempt any TWO.---------12 Marks
a. What is virus and Worms? Describe the virus spreading mechanism.
b. With respect to security policies, describe policies, standard, guideline and procedure.
c. Describe the handprint and Fingerprint mechanism for authentication of the user.

Q.3 Attempt any TWO.----12 Marks
a. Describe what is code injections and how to prevent code injection.
b. Describe caeser’s cipher substitution technique of cryptography
c. Describe buffer overflow and different status of the stack related to buffer overflow

Q.4 Attempt any TWO.--------16 Marks
a. What is operating system security? Compare the security system of windows and Linux
operating system.
b. Describe single homed bastion and screened host gateway type of firewall
c. Describe the component of Host Based IDS? State its advantage and disadvantages.

Q.5 Attempt any THREE.-----------12 Marks
a. Describe Threat, Vulnerability and attack as characteristics of Computer Intrusion.
b. List the method of defense? Describe controls, Encryption related to defense methods.
c. Describe MD2, MD4, MD5 hashing functions.
d. Describe the requirement and solution to email security.

Q.6 Attempt any THREE.----------12 Marks
a. What is Hash Function? Describe with example.
b. Describe the handwriting and signature process of verification.
c. Explain symmetric and asymmetric key cryptography.
d. List and describe different ways of web security.
 

ana