Cyber Security lab Solutions-IIIBCOM©-VI SEM
1.What are the roles and responsibilities of system
administrator?
Proc:-
Managing Windows, Linux, or Mac systems
Upgrading, installing, and configuring application software and computer hardware
Troubleshooting and providing technical support to employees
Creating and managing system permissions and user accounts
Performing regular security tests and security monitoring
Maintaining networks and network file systems
create user account
On Windows 10 Home and Windows 10 Professional editions:
1. Select Start > Settings > Accounts > Family & other users.
2. Under Other users, select Add someone else to this PC.
3. Enter that person's Microsoft account information and follow the prompts.
How to Create a Windows 10 or Windows 8 Password
1. Open Control Panel. ...
2. Select User Accounts (Windows 10)
3. Open User Accounts.
4. Choose Make changes to my account in PC settings.
5. Select Sign-in options from the left.
6. Under the Password area, choose Add.
2.Write the steps for disk partition and perform operations kike
shrinking ,extending,deleting and formatting.
Disk partition :-
Create a partition from unpartitioned space with these steps:
1. Right-click This PC and select Manage.
2. Open Disk Management.
3. Select the disk from which you want to make a partition.
4. Right-click the Unpartitioned space in the bottom pane and select New Simple
Volume.
5. Enter the size and click next, and you are done.
Disk formatting:-
1.In the left pane, under Storage,
2. select Disk Management.
3. Right-click the volume that you want to format, and
then select Format.
4.To format the volume with the default settings, in the
Format dialog box,
5. select OK, and then select OK again.
3.Case study on Ransomware attacks.
A construction management company suffered a devastating
ransomware attack infecting their backups and internal work
stations, paralyzing the company’s ability to function at capacity and
leaving 30 employees unable to work for 10 days while having their
data held for ransom.
The company’s existing network security and data backup/disaster
recovery provider did not have the safety measures in place to
prevent the attack. In addition, while the company was under the
impression their data was being backed up regularly and securely in
multiple locations, this was not actually the case. The attack
resulted in over $100,000 in lost productivity and business as well as
$60,000 in bitcoin ransom to restore their data.
Proc:-
1. Remove ransomware infection from internal workstations and
backups
2. Analyze existing data and backups to determine the level of
loss and how to proceed
3. Facilitate data retrieval from attackers
4. Encrypt and restore data
5. Implement detailed security measures to prevent future
attacks
6. Designed and implemented a thorough, automated, and secure
data backup strategy that provides regular backups in multiple
secure locations (backups are continuously monitored and
tested for reliability and recency)
7. Provided impactful employee education to improve internal
security measures and avoid phishing scams
8. Ongoing monitoring and security management to mitigate
issues before they occur
4.Write the steps for installation of software from open
source mode and paid subscription mode.
4.Installation of open source software:-
Proc:-
1. Step 1 − Select Version of Python to Install. ...
2. Step 2 − Download Python Executable Installer. ...
3. Step 3 − Run Executable Installer. ...
4. Step 4 − Verify Python is installed on Windows. ...
5. Step 5 − Verify Pip was installed.
Paid subscription mode software:-
1. Open the App Store and select Search in the bottom right corner.
2. Type in Spotify, and select Get for Spotify in the list.
3. Select Get or Cloud Install for Spotify.
4. Select Install.
5. Select Open.
5.Write the steps to make Microsoft Chrome as a default
browser ,Add Active X controls and add on to the browser.
Microsoftchrome browser:-
1. On your computer, click the Start menu .
2. Click Control Panel.
3. Click Programs Default Programs. Set your default programs.
4. On the left, select Google Chrome.
5. Click Set this program as default.
6. Click OK.
Add Active X Controls:-
1.Click Tools > Internet Options.
2.Click the Security tab > Custom Level.
3.Scroll down to ActiveX controls and plugins
4. and click Enable for: Run ActiveX controls
and plugins.
6.Write the steps to establish peer to peer network connection
using two systems in a LAN .
Peer to peer network connection using two systems in a
LAN:-
PROCEDURE:-
Peer to Peer Network Sharing
1. Step 1: Navigate to the Desktop. ...
2. Step 2: Create Your Folder. ...
3. Step 3: Navigate to the Folder and Open the Properties. ...
4. Step 4: Choose Who You Want to Share With. ...
5. Step 5: Sharing the Folder. ...
6. Step 6: Permissions. ...
7. Step 7: Open Control Panel. ...
8. Step 8: Network and Sharing.
7.What is WiFi/How do you configure the Wifi on windows
operating system.
WifI Configuration :-
Connect to a Wi-Fi network in Windows
1. Select the Network icon on the far right side of the taskbar. ...
2. On the Wi-Fi quick setting, select Manage Wi-Fi connections (>).
3. Choose the Wi-Fi network you want, then select Connect.
4. Type the network password, and then select Next.
8.Write the steps to install and configure Network components
like switches,Hub and Modem and how do you connect to
Dial-up networking.
Install and configure switch:-
How to configure a network switch
1. Step 1: Connect to the console. ...
2. Step 2: Set a management IP and default gateway. ...
3. Step 3: Set hostname and domain name. ...
4. Step 4: Set logins on VTY lines and console port. ...
5. Step 5: Set Privileged EXEC password. ...
6. Step 6: Enable SSH. ...
7. Step 7: Create VLANs. ...
8. Step 8: Add access ports to a VLAN.
Manually set network settings
1. Open the Activities overview and start typing Settings.
2. Click on Settings.
3. If you plug in to the network with a cable, click Network. ...
4. Click the. ...
5. Select the IPv4 or IPv6 tab and change the Method to Manual.
6. Type in the IP Address and Gateway, as well as the appropriate Netmask.
Modem:-
1. Connect your modem. Before you power up your modem, you'll want to connect it
to your computer and your phone jack or cable outlet. ...
2. Connect your router to the internet (optional) ...
3. Test your internet connection. ...
4. Set up your modem and network. ...
5. Connect to a wireless network.
9.What are the features of firwall ?Write the steps in providing
network security and to set Firewall security in windows.
Network security and firewall security in windows
1.Go to Start and open Control Panel.
2.Select System and Security > Windows Defender Firewall.
3.Choose Turn Windows Firewall on or off.
4.Select Turn on Windows Firewall for domain, private, and
public network settings.
10.Write the steps for installation of system
software ,application software and Antivirus.
Installation of system software:-
Installing software from the Web
1. Locate and download an .exe file.
2. Locate and double-click the .exe file. (It will usually be in your Downloads folder.)
3. A dialog box will appear. Follow the instructions to install the software.
4. The software will be installed.
Installation of Application software:-
You can follow the steps below to install an application from an .exe file.
1. Locate and download an .exe file.
2. Locate and double-click the .exe file. (It will usually be in your Downloads folder.)
3. A dialog box will appear. Follow the instructions to install the software.
4. The software will be installed.
Installation of Antivirus software:-
How to enable Windows Defender in Windows 10
1. Click the windows logo. ...
2. Scroll down and click Windows Security to open the application.
3. On the Windows Security screen, check if any antivirus program has been
installed and running in your computer. ...
4. Click on Virus & threat protection as shown.
11.What do you mean by Spooling printers?Write the steps for spooling printer.
Spooling printers:- To spool (which stands for "simultaneous peripheral operations
online") a computer document or task list (or "job") is to read it in and store it,
usually on a hard disk or larger storage medium so that it can be printed or
otherwise processed at a more convenient time (for example, when a printer is
finished printing .
Steps for spooling printers:-
How to Enable and start the Spooler Service or Start Printer Spooler Service
1. Click Start, type Services.msc in the Search box, or Click WIN+Q, type
“Services.msc” in the open box.
2. Double-click Printer Spooler in the list.
3. Click on Start, In the Startup Type list, make sure that “Automatic” is selected and
click OK.
12.Write a program to identify the category of IP address for a
given IP address.
To identify the category of ip address for a given ip address.
#include <stdio.h>
#include <string.h>
/*
Function : extractIpAddress
Arguments :
1) sourceString - String pointer that contains ip address
2) ipAddress - Target variable short type array pointer that will
store ip address octets
*/
void extractIpAddress(unsigned char *sourceString,short
*ipAddress)
{
unsigned short len=0;
unsigned char oct[4]={0},cnt=0,cnt1=0,i,buf[5];
len=strlen(sourceString);
for(i=0;i<len;i++)
{
if(sourceString[i]!='.'){
buf[cnt++] =sourceString[i];
}
if(sourceString[i]=='.' || i==len-1){
buf[cnt]='\0';
cnt=0;
oct[cnt1++]=atoi(buf);
}
}
ipAddress[0]=oct[0];
ipAddress[1]=oct[1];
ipAddress[2]=oct[2];
ipAddress[3]=oct[3];
}
int main()
{
unsigned char ip[20]={0};
short ipAddress[4];
printf("Enter IP Address (xxx.xxx.xxx.xxx format): ");
scanf("%s",ip);
extractIpAddress(ip,&ipAddress[0]);
printf("\nIp Address: %03d. %03d. %03d. %03d\
n",ipAddress[0],ipAddress[1],ipAddress[2],ipAddress[3]);
if(ipAddress[0]>=0 && ipAddress[0]<=127)
printf("Class A Ip Address.\n");
if(ipAddress[0]>127 && ipAddress[0]<191)
printf("Class B Ip Address.\n");
if(ipAddress[0]>191 && ipAddress[0]<224)
printf("Class C Ip Address.\n");
if(ipAddress[0]>224 && ipAddress[0]<=239)
printf("Class D Ip Address.\n");
if(ipAddress[0]>239)
printf("Class E Ip Address.\n");
return 0;
}
13.Write a program to check the strength of the password.
#include <stdio.h>
int main() {
int pass, x=10;
while (x!=0)
{
printf("\nInput the password: ");
scanf("%d",&pass);
if (pass==1234)
{
printf("Correct password");
x=0;
}
else
{
printf("Wrong password, try another");
}
printf("\n");
}
return 0;
}
Output:-
Input the password: 1234
Correct password
14.Write the steps to Transfer files between wireless
communication using Blue tooth and FTP.
TO Transfer files between wireless communication using Blue
tooth and FTP.
1.In Devices settings, select Send or receive files via
Bluetooth.
2. In Bluetooth File Transfer, select Send files > choose the
device you want to share to > Next.
3.Select Browse > the file or files to share > Open > Next
(which sends it) > Finish.
FTP:-
How to Copy Files to a Remote System ( ftp )
1. Change to the source directory on the local system. ...
2. Establish an ftp connection. ...
3. Change to the target directory. ...
4. Ensure that you have write permission to the target directory. ...
5. Set the transfer type to binary. ...
6. To copy a single file, use the put command.
15.Prepare a case study on Cosmos Bank cyber attack in pune.
In one of the biggest cyber attacks on an Indian
bank, several cloned debit cards of Cosmos Bank were
used for thousands of ATM transactions from India and
28 other countries in a period of seven hours on August
11, 2018.
RESEARCH METHODOLOGY
For present research work secondary data will be used. Various statistical tools
will be
used to analyse the secondary data such as:-
a.
Document Review
-
Obtaining the actual forms and operating documents currently
being used
b.
Observation- Analysing annual reports and press release, verifying the statements
made during the interviews
c.
Web Search- The information related to outside region will be studied from
internet and other published articles.
16.Write a program to search the given pattern using optimized
algorithm.
/* C program for A modified Naive Pattern Searching
algorithm that is optimized for the cases when all
characters of pattern are different */
#include<stdio.h>
#include<string.h>
/* A modified Naive Pettern Searching algorithn that is optimized
for the cases when all characters of pattern are different */
void search(char pat[], char txt[])
{
int M = strlen(pat);
int N = strlen(txt);
int i = 0;
while (i <= N - M)
{
int j;
(j = 0; j < M; j++)
if (txt[i+j] != pat[j])
break;
if (j == M) // if pat[0...M-1] = txt[i, i+1, ...i+M-1]
{
printf("Pattern found at index %d
", i);
i = i + M;
}
else if (j == 0)
i = i + 1;
else
i = i + j; // slide the pattern by j
}
}
/* Driver program to test above function */
int main()
{
char txt[] = "ABCEABCDABCEABCD";
char pat[] = "ABCD";
search(pat, txt);
return 0;
}
Output:
Pattern found at index 4
Pattern found at index 12
17.Prepare a case study on Social Media crime that occurred in
Pune 2021.
1. Online Threats, Stalking, Cyberbullying
2. Hacking and Fraud
3. Buying Illegal Things
4. Posting Videos of Criminal Activity
5. Vacation Robberies
18.Preapare a case study on Japanese Bank for Keylogger scam.
Computer based crimes are on the rise. Technological advancements and
automation of services has brought about numerous advantages as well as
limitations. For each technology created or implemented, it appears like there is
a subsequent anti-operations program that is put in place. Despite the numerous
computer crimes that the society, especially the financial institutions faces, there
are measures that are put in place to curb or control the rate at which these
crimes are committed.
In the London case, where the criminals attempted to transfer $420 from a
London branch of Japanese bank, the technique applied was password cracking.
Through the use of Key loggers the criminals were in a position to get access to
some of the key passwords to the bank system. The information that was
obtained from the key logger programs was used to access some of the most
important and restricted data areas, including access codes that were private the
banking top managerial staff. This gave the criminals directs access to the bank
information that led to the attempted crime.
Case Study
Other than the example of the attempted London crime, it has been reported that
there was recently a cyber-crime ting that targeted US bank accounts. This
followed charges put against three foreigners- a Russian, a Latvian and a
Romanian. They were accused of creating and distributing a computer program
that infected more than 40, 000 workstations in the United States. This was
aimed at stealing customers’ bank account numbers and other information. It
was known as the Gozi virus led to theft of unspecified millions of dollars
according to court documents. Measures put did not bear substantial success in
preventing the crimes.
19.Write the steps to prevent the denial of service attacks.
you can rely on the following types of network security to protect your
business from DDoS attempts:
Firewalls and intrusion detection systems that act as traffic-scanning barriers
between networks.
Anti-virus and anti-malware software that detects and removes viruses and
malware.
20.Write the steps to demonstrate intrusion detection system (ids)
using the tool SNORT.
Snort is easy to employ as a distributed intrusion detection system (IDS).
...
Snort is typically run in one of the following three modes:
1. Packet sniffer: Snort reads IP packets and displays them on the console.
2. Packet Logger: Snort logs IP packets.
3. Intrusion Detection System: Snort uses rulesets to inspect IP packets.
21.What is Malware?write the steps to remove the malware from
your PC.
Malware:- Malware (short for “malicious software”) is a file or
code, typically delivered over a network, that infects,
explores, steals or conducts virtually any behavior an
attacker wants.
How to remove malware from a PC
1. Step 1: Disconnect from the internet. ...
2. Step 2: Enter safe mode. ...
3. Step 3: Check your activity monitor for malicious applications. ...
4. Step 4: Run a malware scanner. ...
5. Step 5: Fix your web browser. ...
6. Step 6: Clear your cache.
22.What are the various types of Vulnerabilities for hacking the
webapplications.
Web Application Vulnerabilities: Easy to Hack, Easy to Fix
Brute-force Attacks.
Privilege Escalation Attacks.
SQL Truncation Attack.
Endpoint Enumeration.
Cross-Site Scripting (XSS)
Access /etc/passwd.
SSH to the box.
23.Write steps for sharing files and printer remotely between two
systems.
1. In the search box on the taskbar, type control panel and then select Control Panel.
2. Under Hardware and Sound, select View devices and printers.
3. Select and hold (or right-click) the printer you want to share, select Printer
properties, and then choose the Sharing tab.
4. On the Sharing tab, select Share this printer.
24.List out the various Mobile security apps.Write the steps to
install and use,one of the mobile security app.
What are the Top Security and Antivirus Programs for Mobile Phones?
Norton Mobile Security. Norton Mobile Security is a comprehensive security and
antivirus app powered by Norton Mobile Insight. ...
Kaspersky Security for Mobile. ...
Avast Mobile Security. ...
AVG Antivirus Free. ...
Bitdefender Mobile Security. ...
Samsung Knox.
Install mobile security app
1. Download Trend Micro: Download Maximum Security. ...
2. Double-click the downloaded file to run the installer. If the User Account Control
window appears, click Yes.
3. Follow the instructions to complete the installation.
4. Fill out the account information to activate your protection.
25.Write the algorithm for encoding and decoding the Hash-Based
Message Authentication code(HMAC).
Hash-based message authentication code (or HMAC) is a cryptographic authentication
technique that uses a hash function and a secret key. With HMAC, you can achieve
authentication and verify that data is correct and authentic with shared secrets, as opposed to
approaches that use signatures and asymmetric cryptography.
26.Prepare a case study on Mahesh Bank Cyber attack.
Police learnt Nigerian handlers operating from India were tasked to open bank
accounts through locals in banks. Phishing mails were sent by an unidentified
hacker to 200 staff of Mahesh bank and two of them clicked on links in
mails, allowing remote access trojan malware to be installed.
27.prepare a case study of cyber attack through Facebook Account.
The most common way that a Facebook account is compromised is by tricking
you into giving the hackers your password. You may get a Messenger
message from a friend on Facebook, saying something like “OMG did you see
who died?” with a link.
Cyber criminals allegedly hacked the servers of the AP Mahesh Cooperative
Urban Bank and allegedly transferred over Rs 12 crore to different accounts.
The police said that some people hacked into the bank servers and later logged
into main accounts and transferred the amount to more than 100 bank accounts
28.Create a presentation on “ethical hacking “ at least 10 slides
Start->All programs->ms powerpoint ->click on new document -
>then type the below content->press F5.
29.Write a program to download a file from HTTP server.
Downloading a file from a HTTP server endpoint via HTTP GET
1. Construct the HTTP GET request to send to the HTTP server.
2. Send the HTTP request and receive the HTTP Response from the HTTP server.
3. Save the contents of the file from HTTP Response to a local file.
30.Create a presentation on “security protocols”.
SSL Protocol : SSL Protocol stands for Secure Sockets Layer protocol, which is
an encryption-based Internet security protocol that protects confidentiality and
integrity of data. ...
TLS Protocol : ...
SHTTP : ...
Set Protocol : ...
PEM Protocol : ...
PGP Protocol :
31.Write the steps to detect the number of devices connected to wifi
and block unauthorized devices.
1. Open a web browser and type the IP address for your router in the address bar.
2. Enter the username and password for the router.
3. Click Connected devices, Attached devices, or something similar.
4. Check the list of devices connected to your wireless network.
32.Prepate a case study on Crypto currency attack.
A 51% attack refers to an attack on a blockchain—such as
Bitcoin, for which such an attack is still hypothetical—by a
group of miners controlling more than 50% of the network's
mining hash rate or computing power.
33.Write an algorithm and program for encrypting a plain text
and decrypting a cipher text using caser cipher .
Caesar Cipher Technique
1. The formula of encryption is: En (x) = (x + n) mod 26.
2. The formula of decryption is: Dn (x) = (xi - n) mod 26. If any case (Dn) value
becomes negative (-ve), in this case, we will add 26 in the negative value.
3. Where, E denotes the encryption. D denotes the decryption. x denotes the letters
value.
34.Write an algorithm and program to implement data
encryption standard(DES) for encryption and decryption.
1. Generating keys. The algorithm involves 16 rounds of encryption, with each round
using a different key. ...
2. Encrypting plain text to obtain ciphertext. Here, the entire algorithm is
implemented. ...
3. Decrypting ciphertext to obtain plain text.
35.Write RSA algorithm and program to implement RSA
standard for encryption and decryption.
mplementation of RSA Algorithm:
1. Consider two prime numbers p and q.
2. Compute n = p*q.
3. Compute ϕ(n) = (p – 1) * (q – 1)
4. Choose e such gcd(e , ϕ(n) ) = 1.
5. Calculate d such e*d mod ϕ(n) = 1.
6. Public Key {e,n} Private Key {d,n}
7. Cipher text C = Pe mod n where P = plaintext.
36.Write the steps to analyse the E-Mail Applications security
vulnerabilities
10 Email Security Risks And How to Tackle Them? [2022]
Spoofing and Phishing.
Vulnerabilities in E-mail Security.
Domain's squatting.
Client-Side Attacks.
Dangerous Files.
Crypto-ransomware.
Configuration Errors.
Browser Exploit Kit.
37.What is SQL injection ?Write steps for SQL injection attack on
insert,update and Delete.
SQL injection is a code injection technique that might destroy your database. SQL
injection is one of the most common web hacking techniques.
Step 1: Train and maintain awareness
tep 2: Don’t trust any user input
Step 3: Use whitelists, not blacklists
Step 4: Adopt the latest technologies
Step 5: Employ verified mechanisms
Step 6: Scan regularly (with Acunetix)
38.write an algorithm and a program to implement Diffie Hellman
key.
Program:-
Output:-
39.Write an algorithm and a program to implement Digital
signature scheme.
Key Generation
You need to generate public and private keys before running the functions to
generate your ciphertext and plaintext. They use certain variables and
parameters, all of which are explained below:
Choose two large prime numbers (p and q)
Calculate n = p*q and z = (p-1)(q-1)
Choose a number e where 1 < e < z
Calculate d = e-1mod(p-1)(q-1)
You can bundle private key pair as (n,d)
You can bundle public key pair as (n,e)
Encryption/Decryption Function
Once you generate the keys, you pass the parameters to the functions that
calculate your ciphertext and plaintext using the respective key.
If the plaintext is m, ciphertext = me mod n.
If the ciphertext is c, plaintext = cd mod n
To understand the above steps better, you can take an example where p = 17 and
q=13. Value of e can be 5 as it satisfies the condition 1 < e < (p-1)(q-1).
N = p * q = 91
D = e-1mod(p-1)(q-1) = 29
Public Key pair = (91,5)
Private Key pair = (91,29)
If the plaintext(m) value is 10, you can encrypt it using the formula me mod n = 82.
To decrypt this ciphertext(c) back to original data, you must use the formula cd
mod n = 29.
40.Write an algorithm and program to generate Pseudo Random
numbers in a range.
Example Algorithm for Pseudo-Random Number Generator
1. Accept some initial input number, that is a seed or key.
2. Apply that seed in a sequence of mathematical operations to generate the
result. ...
3. Use that resulting random number as the seed for the next iteration.
4. Repeat the process to emulate randomness.
41.Create a presentation on “Cyber security Regulations “ with at
least 10 slides.
The below data to prepare slides in powerpoint.
Cyber security regulations are laws that govern the types of
measures an organization must take to protect itself, its
data, and its customers from cyber threats and data
breaches.
A cyber security regulation is needed in order to protect
information technology along with computer systems
with the purpose of compelling various organizations as
well as companies to protect their systems and
information from cyber attacks.
42.Create a presentation on “Role of International Law”.
In mspowrpoint to prepare slides the below data.
The main role of international law is to promote global
peace and prosperity.
Ideally, international law and its accompanying institutions act
as a balm to smooth over opposing interests that nations may
have.
43.Create a presentation on “Cyber Forsensics” .
Computer forensics is the application of investigation and
analysis techniques to gather and preserve evidence
from a particular computing device in a way that is
suitable for presentation in a court of law.
Cyberforensics is an electronic discovery technique used to determine and
reveal technical criminal evidence. It often involves electronic data storage
extraction for legal purposes. Although still in its infancy, cyberforensics is gaining
traction as a viable way of interpreting evidence.
44.Create a presentation on “cyber security standards “.
The two primary standards -- ISO 27001 and 27002 --
establish the requirements and procedures for creating an
information security management system (ISMS).
Having an ISMS is an important audit and compliance
activity. ISO 27000 consists of an overview and vocabulary
and defines ISMS program requirements.
45.Create a presentation on “Cyber security Attacks” .
A cyber attack is an attempt to disable computers, steal
data, or use a breached computer system to launch
additional attacks. Cybercriminals use different methods to
launch a cyber attack that includes malware, phishing,
ransomware, man-in-the-middle attack, or other methods.
15 Common Types of Cyber Attacks. While there are many
different ways that an attacker can infiltrate an IT system,
most cyber-attacks rely on pretty similar techniques. Below
are some of the most common types of cyber-attacks.
46.Write a program to validate your Email address.
Top 10 Free Email Verification Software in 2022
ZoomInfo SalesOS.
Emailable.
ZeroBounce.
Snovio.
NeverBounce.
Bouncer.
RocketReach.
MailerLite.
The above softwares to validate the email address.
47.Write a program to check the devices connected to your internet and about
data usage.
The Google Wifi app shows how much data your devices
currently upload and download and up to 30 days historically
as well as device details.
Open the Google Wifi app .
Devices. The numbers next to "Devices" represent your total
Internet (WAN) traffic to and from your network.
48.Create a presentation on “cyber security policies 2013 “.
Cybersecurity policies are important because cyberattacks and data breaches are
potentially costly.
...
Such practices might include:
Rules for using email encryption.
Steps for accessing work applications remotely.
Guidelines for creating and safeguarding passwords.
Rules on use of social media.
49.Create a presentation on “state and private sectors in Cyber
Space “
The private sector has a responsibility to proactively mitigate cyber risk rather
than react only when an attack occurs, and also to remain compliant with
regulators.
To start, people feel that the general state of cybersecurity in the economy
is getting worse. In 2020, 80% of individuals in CompTIA's study felt like the state
of cybersecurity was improving. In 2021, only 69% feel the same.
50.Write the steps to read Email Headers and identify them as SPAM.
How to read email full headers
1. Open the email you want to check the headers for.
2. Next to Reply , click More. Show original.
3. Copy the text on the page.
4. Open the Message header tool.
5. In "Paste email header here," paste your header.
6. Click Analyze the header abov
****************