Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
27 views2 pages

Cybersecurity Practical Guide

The document outlines 20 practical assignments related to information security topics such as analyzing security attacks, configuring security settings, testing browser and email security, demonstrating phishing attacks, and more. Students are asked to complete the practicals, summarize results, and provide documentation like screenshots and reports.

Uploaded by

mmieduindiaanand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views2 pages

Cybersecurity Practical Guide

The document outlines 20 practical assignments related to information security topics such as analyzing security attacks, configuring security settings, testing browser and email security, demonstrating phishing attacks, and more. Students are asked to complete the practicals, summarize results, and provide documentation like screenshots and reports.

Uploaded by

mmieduindiaanand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Sr.

no Practicals Date MARKS SIGN


1 Prepare a case study on recent 2 information
security attacks. Summarize and discuss which
part of the CIA triad has been broken in each.
2 Choose any 2 real-world examples of security
attacks and identify techniques and tools used by
attackers for active and passive attacks.
3 Install Spyrix Free Keylogger, Iwantsoft Free
Keylogger, or any other keylogger. configure your
PC to monitor the system for keystrokes and
screenshots.
4 Protect your personal computer system by creating
a secure User Accounts policy for safety and
security
5 Configure windows firewall for inbound and
outbound rules
6 Use USB security software such as Autorun
Deleter, Panda USB Vaccine to minimize risk
from removable devices
7 Use EaseUSTodo Backup or any other tool to
create backup and restore your computer.
8 Configure the security settings of your browser

9 Test browser security using the following tools


and report your findings: Qualys BrowserCheck,
Cloudflare ESNI Checker, Privacy Analyzer,
Panopticlick, AmIUnique
10 Test your email data breach which can be used for
identity theft using following tools:
1. https://www.f-secure.com/en/home/free-
tools/identitytheft-checker
2. https://haveibeenpwned.com/If your identity is
compromised then prepare a report on how to
mitigate the risk?
11 Analyze and identify normal and spam E-mail
headers using any header analyzer tool for fraud or
phishing emails. Summarize your finding in the
report. (Tool: https://mailheader.org/ or any other)
12 Secure your mobile device :
1. Prevent installation of third-party applications.
2. Check permissions given to the installed
application and evaluate whether the given
permission is actually required by that application
i.e., message application should not have
permission to access camera
3. To prevent your device from connecting to
poorly configured or insecure networks disable
auto-connect in wifi settings.
4. Turn off location services, Bluetooth, wifi,
mobile data as and when it is not required
5. Configure backup and restore data settings on phone.
13 Use Google password manager available at given
link https://passwords.google.com/ to save,
manage, protect and create strong passwords.
14 Demonstrate a phishing attack simulation with the
GoPhish tool.
15 Test website authenticity and possible phishing
websites using VirusTotal, Google Transparency
Report, URLVoid, or any other tools. Identify
ways to report Fraudulent or Scam Websites.
16 Configure all privacy settings for social networks
with which you have an account and review your
entire profile.
17 Survey recent social media scams like lottery
scams, job scams and prepare a report for the
following: ● What is the attacker trying to gain? ●
Who is being scammed? ● What are the
consequences for the person being scammed? ●
Why does the scam work successfully? ● What
awareness is required which could avoid the scam?
18 Study a government Cybercrime portal to prepare
a report on cybercrime and its laws.
19 Prepare a report on how to report cybercrime
online.
20 Prepare a report on online acceptable behavior
against unethical behavior.

You might also like