Cybersecurity Record
Cybersecurity Record
Cybersecurity Record
Prog sol:
Steps for creating a user account, setting permissions, and protecting your
files with a password:
It's important to note that protecting files with a password alone may not be
sufficient. It's also essential to have proper security measures in place, such as
firewalls, antivirus software, and regular backups, to ensure the safety and
security of your data.
2. Prog solution:
Disk partitioning is the process of dividing a physical hard drive into multiple logical drives or
partitions. Here are the steps for disk partitioning and performing operations like shrinking,
extending, deleting, and formatting:
1. Open the Disk Management tool by pressing the Windows key + X and selecting "Disk
Management" from the menu.
2. Right-click on the unallocated space or the partition you want to modify and select "New Simple
Volume," "Shrink Volume," "Extend Volume," "Delete Volume," or "Format."
3. To create a new partition, select "New Simple Volume," and the New Simple Volume Wizard
will appear. Follow the on-screen instructions to specify the size, drive letter, file system format,
and volume label for the new partition.
4. To shrink a partition, right-click on the partition you want to shrink and select "Shrink Volume."
Enter the amount of space you want to shrink the partition by in MB (megabytes), and click
"Shrink."
5. To extend a partition, right-click on the partition you want to extend and select "Extend
Volume." Follow the on-screen instructions to specify the amount of space you want to add to
the partition.
6. To delete a partition, right-click on the partition you want to delete and select "Delete Volume."
Confirm the deletion, and the partition will be removed, and the space will become unallocated.
7. To format a partition, right-click on the partition you want to format and select "Format." Select
the file system format you want to use (NTFS, FAT32, etc.), and enter a volume label. Click
"OK" to format the partition.
It's important to note that when you delete a partition, all data on that partition will be lost, so
make sure you have a backup before deleting any partitions. Additionally, when extending a
partition, the unallocated space you want to add must be adjacent to the partition you want to
extend. If there are partitions between the partition you want to extend and the unallocated space,
you'll need to move or delete those partitions first.
3. Prog solution:
MediaMarkt immediately took steps to contain the attack and protect its
customers' data. The company's IT team disconnected affected systems from
the network and shut down some of the servers to prevent the malware from
spreading further. The company also contacted law enforcement agencies and
hired cybersecurity experts to investigate the attack.
The aftermath of the attack was also challenging for MediaMarkt. The
company had to invest significant resources in rebuilding its IT infrastructure
and improving its cybersecurity measures to prevent future attacks.
MediaMarkt also had to deal with the reputational damage caused by the
attack, as customers and investors became concerned about the company's
ability to protect their data.
Lessons Learned
1. Regularly backup your data: MediaMarkt was able to recover from the attack
because it had backup systems in place. Having a regular backup system is
critical to ensure that you can restore your data in case of an attack.
2. Invest in cybersecurity measures: Companies must invest in cybersecurity
measures such as firewalls, antivirus software, and intrusion detection systems
to prevent attacks.
3. Train your employees: Cybersecurity is everyone's responsibility. Companies
must train their employees to identify potential threats and take appropriate
action to prevent attacks.
4. Have an incident response plan: Having an incident response plan in place can
help companies respond quickly and effectively to a cybersecurity attack. An
incident response plan should outline the steps to take in case of an attack,
including who to contact and how to contain the attack.
Conclusion
The MediaMarkt ransomware attack is just one example of the growing threat
of cyberattacks to companies of all sizes. As the threat of ransomware attacks
continues to grow, it's critical that companies take proactive steps to protect
their data and IT infrastructure. By investing in cybersecurity measures,
training employees, and having an incident response plan in place, companies
can reduce the risk of a ransomware attack and minimize the damage if one
does occur.
4. Prog solution:
1. Identify the software: Go to the website or repository of the open source
software that you want to install. Search for the software and check if it is
compatible with your operating system.
2. Download the software: Once you have identified the software, click on the
download button to download the latest version of the software. Make sure to
download the appropriate version for your operating system.
3. Extract the downloaded file: Once the software is downloaded, extract the
downloaded file using any suitable extraction tool. The extracted files may be
in a compressed format like .zip or .tar.
4. Install the software: Once extracted, follow the instructions provided in the
installation guide to install the software. The installation process may vary
depending on the software being installed.
5. Complete the installation: Once the installation is completed, configure the
software settings as required. The software is now ready to use.
1. Choose the software: Go to the website or vendor of the software that you
want to install and purchase the subscription for the same. Check if the
software is compatible with your operating system.
2. Download the software: Once the subscription is purchased, log in to your
account on the vendor's website and download the software. Ensure to
download the appropriate version for your operating system.
3. Launch the installation wizard: Navigate to the downloaded file and double-
click on the setup file to launch the installation wizard.
4. Agree to the terms and conditions: Read the terms and conditions provided in
the installation guide and agree to the same.
5. Enter the license key: Enter the license key provided by the vendor during the
purchase process. This key may be sent via email or available in your account
dashboard.
6. Choose the installation location: Choose the location where you want to install
the software. You may also choose to install the software in the default
location.
7. Complete the installation: Once all the above steps are completed, the
installation process will begin. Follow the on-screen instructions to complete
the installation.
8. Configure the software settings: Once the installation is completed, configure
the software settings as required. The software is now ready to use.
Note: The installation process may vary slightly depending on the software
vendor and the type of software being installed. It is always recommended to
read the installation guide and follow the instructions carefully to avoid any
errors or issues.
Program 5 solution:
1. Launch Google Chrome: Open the Google Chrome browser on your computer.
2. Access Chrome Settings: Click on the three-dot menu icon located at the top-
right corner of the browser window. Select "Settings" from the drop-down
menu.
3. Scroll down and click on "Advanced": This will expand the settings menu.
4. Find "Default browser": Under the "System" section, click on the "Default
browser" option.
5. Click on "Make default": Click on the button labeled "Make default" to make
Google Chrome your default browser.
6. Restart your computer: After setting Google Chrome as the default browser,
you may need to restart your computer for the changes to take effect.
Steps to Add ActiveX Controls:
1. Open Google Chrome: Launch the Google Chrome browser on your computer.
2. Access Chrome Extensions: Click on the three-dot menu icon located at the
top-right corner of the browser window. Select "More tools" and then select
"Extensions" from the drop-down menu.
3. Search for ActiveX Control: In the Chrome Web Store search box, type
"ActiveX Control" and press enter.
4. Choose an ActiveX Control: From the search results, select an ActiveX Control
that suits your needs and click on "Add to Chrome" to install it.
5. Enable the ActiveX Control: Once the ActiveX Control is installed, navigate to
the website where you want to use the ActiveX Control. Chrome will prompt
you to enable the ActiveX Control. Click "Enable" to allow the control to run.
1. Open Google Chrome: Launch the Google Chrome browser on your computer.
2. Access Chrome Web Store: Click on the three-dot menu icon located at the
top-right corner of the browser window. Select "More tools" and then select
"Extensions" from the drop-down menu.
3. Search for Add-ons: In the Chrome Web Store search box, type the name of
the Add-on that you want to install and press enter.
4. Choose an Add-on: From the search results, select an Add-on that suits your
needs and click on "Add to Chrome" to install it.
5. Enable the Add-on: Once the Add-on is installed, navigate to the website
where you want to use the Add-on. Chrome will prompt you to enable the
Add-on. Click "Enable" to allow the Add-on to run.
Note: The process to add ActiveX controls and Add-ons may vary depending
on the software and website requirements. It is always recommended to check
the installation instructions provided by the software vendor or website.
Program 6 :
1. Connect both computers: Connect both computers to the same LAN using
Ethernet cables or connect both systems to the same Wi-Fi network.
2. Set IP addresses: Assign IP addresses to both computers on the same subnet.
To do this, open the Control Panel on both computers and navigate to
Network and Sharing Center. Select Change adapter settings, right-click on
the Local Area Connection, and select Properties. Select Internet Protocol
Version 4 (TCP/IPv4), click on Properties, and assign IP addresses on the same
subnet. For example, Computer 1 can have an IP address of 192.168.0.1 and
Computer 2 can have an IP address of 192.168.0.2.
3. Enable File and Printer Sharing: Open Control Panel on both computers and
navigate to Network and Sharing Center. Select Change advanced sharing
settings and enable File and Printer Sharing.
4. Create a shared folder: On one of the computers, create a folder that you want
to share with the other computer. Right-click on the folder, select Properties,
navigate to the Sharing tab, and click on Advanced Sharing. Enable the "Share
this folder" option and click on Permissions to set the permission levels for
other users on the network.
5. Connect to the shared folder: On the other computer, open File Explorer, and
in the address bar, type \computername\sharedfoldername, where
computername is the name of the computer with the shared folder, and
sharedfoldername is the name of the shared folder. For example, if Computer
1 has a shared folder named "SharedFiles," the address will be
\192.168.0.1\SharedFiles.
6. Enter the username and password: If prompted, enter the username and
password of the user account on the computer that has the shared folder.
7. Access shared files: After entering the correct credentials, you should be able
to access the shared files on the other computer.
Note: The steps may vary slightly depending on the operating system and the
network configuration.
Program 7 :
WiFi is a technology that uses radio waves to provide wireless high-speed
internet and network connections between devices such as computers,
smartphones, tablets, and other wireless-enabled devices.
To configure WiFi on a Windows operating system, you can follow these steps:
1. Open the Network & Internet Settings: Click on the network icon in the system
tray (bottom right corner of the taskbar) or go to the Settings app and click on
Network & Internet.
2. Select the WiFi network: In the Network & Internet settings, select WiFi from
the left pane, and click on the "Show available networks" option to see the list
of available wireless networks.
3. Connect to a WiFi network: Select the WiFi network that you want to connect
to from the list of available networks and click on the "Connect" button.
4. Enter the network password: If the network is secured with a password, you
will be prompted to enter the password. Type in the password and click on
"Connect."
5. Configure network settings: Once connected, you can configure additional
network settings by clicking on the "Properties" button next to the network
name. Here you can change the network name, turn on or off network
discovery, configure network sharing, and more.
Note: If you are connecting to a hidden network, you will need to click on the
"Manually connect to a wireless network" option and enter the network name
(SSID), security type, and security key (password) manually.
1. Choose the right equipment: Determine the type and number of devices you
need based on your network requirements. A switch is used to connect
multiple devices within a LAN, while a hub is used to connect devices in a
small network. A modem is used to connect to the internet.
2. Install the devices: Follow the manufacturer's instructions to install the devices
physically, such as mounting switches or hubs on a rack or desk, and
connecting power and network cables.
3. Configure the devices: Connect to the device's management interface, usually
through a web browser or specialized software provided by the manufacturer.
Configure the network settings, such as IP address, subnet mask, gateway, and
DNS server settings.
4. Test the network: Verify that the devices can communicate with each other
and access the internet, if necessary. Troubleshoot any connectivity issues by
checking cables and configuration settings.
Program 9 :
Firewalls are a network security technology that helps to control access to a
network by monitoring and filtering traffic that flows through it. Here are
some common features of firewalls:
1. Packet filtering: Firewalls can block traffic based on predefined rules that filter
incoming and outgoing traffic based on IP address, port number, protocol,
and other criteria.
2. Application-level filtering: Firewalls can also monitor and filter traffic based on
the type of application, such as blocking or allowing access to specific
websites or email services.
3. Network Address Translation (NAT): Firewalls can hide the internal network IP
addresses and translate them to external IP addresses, making it difficult for
attackers to identify and target specific hosts.
4. VPN support: Firewalls can provide secure remote access to a network using
virtual private network (VPN) technologies.
1. Open the Windows Security app: Click on the Start button, type "Windows
Security" in the search bar, and select the Windows Security app from the
search results.
2. Choose the Firewall & network protection option: Click on the Firewall &
network protection option in the Windows Security app.
3. Check the firewall status: Check if the firewall is turned on or off. If the firewall
is turned off, click on the "Turn on" button to enable it.
4. Configure firewall settings: Click on the "Allow an app through firewall" option
to configure the firewall settings. Select the app you want to allow or block
from the list, or add a new app by clicking on the "Change settings" button.
5. Customize firewall rules: Click on the "Advanced settings" option to customize
the firewall rules. Here, you can create new rules for inbound and outbound
traffic, set port and protocol filtering, and configure network profiles for public
and private networks.
6. Test the firewall: Test the firewall settings by accessing various applications
and services on your network. Check if the firewall is blocking any legitimate
traffic and adjust the rules accordingly.
By following these steps, you can set up and configure firewall security in
Windows to help protect your network from unauthorized access and
potential threats.
Program 10 :
Here are the steps for installing system software, application software, and
antivirus:
By following these steps, you can install system software, application software,
and antivirus software on a computer or server, and help ensure that the
system is secure, up-to-date, and running smoothly.
Program 11:
Spooling, short for Simultaneous Peripheral Operations Online, is a feature
used in printing to allow multiple print jobs to be stored in a buffer, or spool,
until the printer is ready to print them. Spooling printers helps to reduce the
wait time for print jobs and to increase the efficiency of printing.
1. Open the printer settings: Click on the "Start" button and select "Devices and
Printers" from the menu. Right-click on the printer you want to use and select
"Printer Properties" from the context menu.
2. Enable spooling: In the "Printer Properties" dialog box, select the "Advanced"
tab, and then click on the "Print Processor" button. In the "Print Processor"
dialog box, select the "WinPrint" processor and select the "RAW" data type.
Under the "Default Data Type" section, select "RAW" and click on "OK".
3. Adjust spooling settings: In the "Advanced" tab of the "Printer Properties"
dialog box, click on the "Spool print documents" radio button. Under the
"Spool Settings" section, select "Start printing after last page is spooled"
option.
4. Configure spooling settings: Click on the "Print Spooled Documents First"
check box to prioritize the print jobs in the spooler. You can also set the
priority of the print jobs by clicking on the "Priority" option and selecting the
desired priority level.
5. Save the settings: Click on the "Apply" button to save the settings, and then
click on the "OK" button to close the dialog box.
By following these steps, you can enable spooling on a printer, which can help
to improve printing performance and reduce wait times for print jobs.
Program 12:
ip_address = input("Enter an IP address: ")
The program prompts the user to enter an IP address, then splits the IP
address into its octets and converts each octet to an integer. It then checks the
value of the first octet to determine the category of the IP address and prints a
message indicating the category. If the IP address is not a valid IP address, the
program prints a message indicating that the IP address is not valid.
Program 13:
import re
def password_strength(password):
score = 0
Program 14:
Transferring files between wireless communication using Bluetooth:
1. Turn on Bluetooth on both devices that you want to transfer files between.
2. On the sending device, locate the file(s) you want to transfer and select them.
3. Choose the option to share the file(s) via Bluetooth.
4. The sending device will start scanning for available Bluetooth devices, and
should display a list of nearby devices.
5. Choose the device that you want to transfer the files to.
6. On the receiving device, you should see a prompt asking if you want to accept
the incoming file transfer. Accept the transfer.
7. The files should start transferring between the two devices.
1. Set up an FTP server on the computer that has the files you want to transfer.
There are several free and paid FTP server software options available for
download.
2. Connect to the FTP server from the device you want to transfer files to. You
can use a dedicated FTP client software, or use the built-in file explorer on
your device if it supports FTP.
3. Log in to the FTP server using the server's IP address and your login
credentials.
4. Navigate to the directory where the files you want to transfer are located.
5. Select the files you want to transfer and choose the option to download them
to the device you're using.
6. The files should start downloading to the device.
Note that for both methods, the devices need to be within range of each other
and be paired or connected to the same network.
Program 15 :
What is Malware? Write the steps to remove the malware from your PC.
Program 16 :
In 2018, Facebook suffered a major cyber attack that affected millions of users.
The attackers exploited a vulnerability in Facebook's "View As" feature, which
allows users to see how their profile appears to others. This allowed the
attackers to steal access tokens, which are digital keys that allow users to stay
logged in to their Facebook account without having to enter their password
every time.
The attackers used these stolen access tokens to take control of users'
Facebook accounts and potentially access other websites and services that
users had linked to their Facebook account. The attack affected approximately
50 million Facebook users and raised serious concerns about the security and
privacy of personal data on social media platforms.
The attack was first discovered by Facebook's security team on September 16,
2018. Facebook immediately took steps to fix the vulnerability and notified law
enforcement authorities. Facebook also reset access tokens for the affected
users and logged them out of their accounts as a precautionary measure.
Facebook faced widespread criticism for the attack, particularly for its handling
of user data and privacy concerns. The company's stock price also took a hit in
the aftermath of the attack.
Lessons Learned:
Users should also be vigilant about their online activity and take steps to
protect their personal data. This includes using strong passwords, enabling
two-factor authentication, and being cautious about sharing personal
information online.
Overall, the Facebook cyber attack serves as a cautionary tale about the
ongoing risks and challenges of online security and the need for continuous
vigilance and investment in security measures.