IS Assignment 3
IS Assignment 3
IS Assignment 3
Objectives
Use a hashing program to verify the integrity of data.
Background / Scenario
It is important to understand when data has been corrupted or it has been tampered with. A hashing program
can be used to verify if data has changed, or if it has remained the same. A hashing program performs a hash
function on data or a file, which returns a (usually much shorter) value. There are many different hash
functions, some very simple and some very complex. When the same hash is performed on the same data,
the value that is returned is always the same. If any change is performed on the data, the hash value returned
will be different.
Note: You will need installation privileges and some knowledge of the process to install Windows programs.
Required Resources
• PC with Internet access
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 4 www.netacad.com
Lab – Compare Data with a Hash
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 4 www.netacad.com
Lab – Compare Data with a Hash
e. Click Finish on the last screen, and close the README file if it opened. You may read the file if you wish.
f. HashCalc is now installed and running.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 4 www.netacad.com
Lab – Compare Data with a Hash
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 4 of 4 www.netacad.com
Lab – What was Taken?
Objectives
Search for and read about a few recent occurrences of security breaches.
Background / Scenario
Security breaches occur when individuals or applications are trying to gain unauthorized access to data,
applications, services, or devices. During these breaches, the attackers, whether they are insiders or not,
attempt to obtain information that they could use for financial gains or other advantages. In this lab, you will
explore a few security breaches to determine what was taken, what exploits were used, and what you can do
to protect yourself.
Required Resources
• PC or mobile device with Internet access
SC Magazine
SC Magazine
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 2 www.netacad.com
Lab – What was Taken?
Reflection
After reading about the security breaches, what can you do to prevent these types of breaches?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 2 www.netacad.com
Lab – Create and Store Strong Passwords
Objectives
Understand the concepts behind a strong password.
Part 1: Explore the concepts behind creating a strong password.
Part 2: Explore the concepts behind securely storing your passwords?
Background / Scenario
Passwords are widely used to enforce access to resources. Attackers will use many techniques to learn
users’ passwords and gain unauthorized access to a resource or data.
To better protect yourself, it is important to understand what makes a strong password and how to store it
securely.
Required Resources
• PC or mobile device with Internet access
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 3 www.netacad.com
Lab – Create and Store Strong Passwords
Take a moment to analyze the characteristics of a strong password and the common password policy set
shown above. Why does the policy set neglect the first two items? Explain.
A good way to create strong passwords is to choose four or more random words and string them together.
The password televisionfrogbootschurch is stronger than J0n@than#81. Notice that while the second
password is in compliance with the policies described above, password cracker programs are very efficient at
guessing that type of password. While many password policy sets will not accept the first password,
televisionfrogbootschurch, it is much stronger than the second. It is easier for the user to remember
(especially is associated with an image), it is very long and its random factor makes it hard for password
crackers to guess it.
Using an online password creation tool, create passwords based on the common company password policy
set described above.
a. Open a web browser and go to http://passwordsgenerator.net
b. Select the options to conform to password policy set
c. Generate the password.
Is the password generated easy to remember?
Using an online password creation tool, create passwords based on random words. Notice that because
the words are appended together, they are not seen as dictionary words.
d. Open a web browser and go to http://preshing.com/20110811/xkcd-password-generator/
e. Generate a random word password by clicking Generate Another! at the top portion of the webpage.
f. Is the password generated easy to remember?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 3 www.netacad.com
Lab – Create and Store Strong Passwords
Besides you, at least one other entity has access to your passwords. Who is that entity?
While having all your passwords stored on the same place can be convenient, there are drawbacks. Can
you think of any?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 3 www.netacad.com
Lab – Backup Data to External Storage
Objectives
Backup user data.
Part 1: Use a local external disk to backup data
Part 2: Use a remote disk to backup data
Background / Scenario
It is important to establish a backup strategy that includes data recovery of personal files.
While many backup tools are available, this lab focuses on the Microsoft Backup Utility to perform backups to
local external disks. In Part 2, this lab uses the Dropbox service to backup data to a remote or cloud-based
drive.
Required Resources
• PC or mobile device with Internet access
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 3 www.netacad.com
Lab – Backup Data to External Storage
e. Start the backup by clicking the Save settings and run backup.
b. Research the services you listed above. Are these services free?
d. Can you access your data from all devices you own (desktop, laptop, tablet and phone)?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 3 www.netacad.com
Lab – Backup Data to External Storage
Reflection
1. What are the benefits of backing up data to a local external disk?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 3 www.netacad.com
Lab – Who Owns Your Data?
Objectives
Explore the ownership of your data when that data is not stored in a local system.
Part 1: Explore the Terms of Service Policy
Part 2: Do You Know What You Signed Up For?
Background / Scenario
Social media and online storage have become an integral part of many people’s lives. Files, photos, and
videos are shared between friends and family. Online collaboration and meetings are conducted in the
workplace with people who are many miles from each other. The storage of data is no longer limited to just
the devices you access locally. The geographical location of storage devices is no longer a limiting factor for
storing or backing up data at remote locations.
In this lab, you will explore legal agreements required to use various online services. You will also explore
some of the ways you can protect your data.
Required Resources
• PC or mobile device with Internet access
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 3 www.netacad.com
Lab – Who Owns Your Data?
e. What are your rights regarding your data? Can you request a copy of your data?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 3 www.netacad.com
Lab – Who Owns Your Data?
b. What can you do to safeguard your account and protect your data?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 3 www.netacad.com
Lab – Discover Your Own Risky Online Behavior
Objectives
Explore actions performed online that may compromise your safety or privacy.
Background / Scenario
The Internet is a hostile environment, and you must be vigilant to ensure your data is not compromised.
Attackers are creative and will attempt many different techniques to trick users. This lab helps you identify
risky online behavior and provide tips on how to become safer online.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 3 www.netacad.com
Lab – Discover Your Own Risky Online Behavior
2) You verify the URL to ensure it is the institution you were looking for before entering any information.
(0 points)
3) You don’t use online banking or any online financial services. (0 points)
f. You read about a program and decide to give it a try. You look around the Internet and find a trial version
on an unknown site, you:
1) Promptly download and install the program. (3 points)
2) Search for more information about the program creator before downloading it. (1 points)
3) Do not download or install the program. (0 points)
g. You find a USB drive while walking to work. you:
1) Pick it up and plug it into your computer to look at its contents. (3 points)
2) Pick it up and plug it into your computer to completely erase its contents before re-using it. (3 points)
3) Pick it up and plug it into your computer to run an anti-virus scan before re-using it for your own files
(3 points)
4) Don’t pick it up. (0 points)
h. You need to connect to the Internet and you find an open Wi-Fi hotspot. You:
1) Connect to it and use the Internet. (3 points)
2) Don’t connect to it and wait until you have a trusted connection. (0 points)
3) Connect to it and establishes a VPN to a trusted server before sending any information. (0 points)
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 3 www.netacad.com
Lab – Discover Your Own Risky Online Behavior
e. Malicious web pages can be easily made to look like a bank or financial institution website. Before
clicking the links or providing any information, double-check the URL to make sure it is the correct web
page.
f. When you allow a program to run on your computer, you give it a lot of power. Choose wisely before
allowing a program to run. Research to make sure the company or individual behind the program is a
serious and legitimate author. Also, only download the program from the official website of the company
or individual.
g. USB drives and thumb drives include a tiny controller to allow computers to communicate with it. It is
possible to infect that controller and instruct it to install malicious software on the host computer. Because
the malware is hosted in the USB controller itself and not in the data area, no amount of erasing or anti-
virus scanning will detect the malware.
h. Attackers will often deploy fake Wi-Fi hotspots to lure users. Because the attacker has access to all the
information exchanged via the compromised hotspot, users connected to that hotspot are at risk. Never
use unknown Wi-Fi hot spots without encrypting your traffic through a VPN. Never provide sensitive data
such as credit card numbers while using an unknown network (wired or wireless).
Reflection
After analyzing your online behavior, what changes would you make to protect yourself online?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 3 www.netacad.com