Uploaded by damanramgarhia85

SYST19866 - Lab 9

advertisement
LAB 8
SYST18966 - Operating Systems Technologies (A+ Certification Prep)
DAMANPREET KAUR
991727345
DUE: 14 JULY 2023 @ 11:59 PM
TASK 1. USING THE WEB TO LEARN ABOUT MALWARE
One source of information about malware on the web is F-Secure Corporation. Go to the
website f-secure.com or another anti-malware site, and find information about the latest
malware threats. Answer the following questions:
1. Name and describe a recent Trojan downloader. How does the Trojan install, and
what is its payload (the harm it does)?
Ans- The newest Trojan downloader is Trojan downloader JPUY. Trojan.Downloader.JPUY
comes as a file called 'hpupdate.exe'. Once it enters a computer, it tries to connect to other
server to download a file. It can also transfer files from one computer to another server
leading to malfunction and transferring of important files which are hard to retrieve.
The payload of Trojan consists of robbery of images, videos, confidential files, damage to
computer, malfunctioning and so on.
2. Name and describe a recent rootkit. How does the rootkit install, and what is its
payload?
Ans- The recent rootkit is W32/Z Access. It infects the app which then consistently shows
ads on the infected computer and can secretly connect with remote servers to collect extra
advertising-related data.
The payload includes utilization of keyloggers which are used by computer to get
control over illegal or fraud access to computer data.
3. Name a recent worm. How does it get into the network, and what is its payload?
Ans- The recent computer worm is W32/Magistr. It is one of the most dangerous worm
including virus infections. It spreads through internet with infected emails very easily and
can destroy hard drives, memory and BIOS of the computer.
TASK 2. RESEARCHING DISPOSAL RULES
Research the laws and regulations in your community concerning the disposal of batteries
and old computer parts. Answer these questions:
4. How do you properly dispose of a monitor in your community?
Ans- The best way to dispose a monitor which is practiced in my community is to drop off
the part at the nearby electrical appliance recycling center.
5. How do you properly dispose of a battery pack used by a notebook computer?
Ans- There are different ways by which battery pack of notebook computers can be
disposed off.
Donating the part is the first method. Another way is to give it to the recycling center where
such appliances are recycled to use it in making new products.
6. How do you properly dispose of a large box of assorted computer parts, including
hard drives, optical drives, computer cases, and circuit boards?
Ans- The recycling center is the best for this too. The parts can be recycled and be used in
new products.
TASK 3. CREATING AND USING AN ANTI-MALWARE SOFTWARE RESCUE DISK
When an infected computer refuses to boot, one method to clean the infection is to create
and use an anti-malware rescue disk. For example, the rescue disk currently offered by
Kaspersky is Kaspersky Rescue Disk 18. Do the following to create a bootable USB flash
drive, CD, or DVD; use it to scan a computer; and answer the following questions:
7. Go to support.kaspersky.com/krd18 and get familiar with the directions to create
and use the rescue disk. Download the rescue disk software. What are the name and
size of the download file for the rescue disk?
8. Create a bootable USB flash drive, CD, or DVD, and then write the Kaspersky image
to the boot media.
a. Which boot media did you use?
b. Which program did you use to make the media bootable?
9. Boot from the rescue disk. On the opening menu, highlight English and press Enter.
What are the options on the next menu screen?
10. Continue the boot using the rescue disk graphic mode. Accept the EULA. Using the
default parameters, is the software set to scan the Windows volume? Boot sectors?
BIOS firmware?
11. Label the disk or flash drive and save it in case you need it to remediate an infected
computer.
Ans- These questions cannot be answered due to the unavailability of USB flash drive.
TASK 4. EXPLORING PASSWORD MANAGEMENT SOFTWARE
Password management software, also called password vault software—such as KeePass
(keepass.info), LastPass (lastpass.com), and Dash lane (dashlane.com)—can hold your
passwords safely so you don’t forget them or have to write them down. Choose one of these
programs and a second of your own selection that interests you, then answer the following
questions about each one:
The Password management software that I selected are LastPass and Keeper.
12. Which platforms are supported?
Ans- The platforms that are supported by LastPass are Windows, Linux, Android, macOS.
Keeper is another password management software which supports Windows, Linux,
macOS, Android and Ios.
13. Which web browsers are supported?
Ans- LastPass supports browsers such as Mozilla Firefox, Google Chrome, Apple safari,
Microsoft edge, Microsoft internet explorer.
Web browsers that are supported by Keeper are Google Chrome, Microsoft edge, Internet
Explorer, Safari and Mozilla Firefox.
14. From how many competitors can the program import passwords?
Ans- LastPass can import passwords from various password softwares and web browsers
including Dashlane, 1Password, keepass, Google chrome, Mozilla Firefox, Apple Safari and
so on.
Keeper can import passwords from 1Password, Lastpass, Roboform, Google chrome, Safari,
Internet explorer and so on.
15. What types of authentication are supported (e.g., master password, fingerprint,
etc.)?
Ans- The type of authentication provided by LastPass are Facial recognition, two-factor
authentication, master password, fingerprint, YubiKey authentication.
Keeper offers master password, biometric, two-factor authentication, FIDO2, Keeper DNA.
16. Where are the passwords stored? Are they synced across devices? How is the
information protected?
Ans- All the passwords in LastPass are stored in the vault which is secured with the master
password.
Keeper uses the same way to store passwords which is the virtual vault. It is secured by the
master password, only known to the user.
17. What are some of the differences between the free edition of each program and the
paid versions?
Ans- The free version of LastPass offers services like password storage, autofill, password
generator, access on m multiple devices, whereas the paid version includes services like
password sharing, emergency access, 1GB encrypted data storage, dark web monitoring
and so on.
The free version of Keeper provides password storage, autofill, basic security audit and
access on multiple devices, on the other hand, the paid version has other benefits like,
unlimited password storage, biometric login, security breach watch, emergency access.
18. What happens to the user’s account if the user dies or is incapacitated?
Ans- If the user dies or is incapacitated, then some softwares provide emergency contact
option which allows the user to let them chose a family member or friend as a trust so they
can use the software even if they are not alive .
Download