Tools 04 – Operating System Hardening

Your Challenge

  • Investigate hardening of operating systems.
  • Choose Linux, Windows or you could look in both. We would rather some depth than breadth here so only choose both if you choose to go deep on both.
  • Note that you could choose a different OS if you like (say FreeBSD)
  • You should actually implement some/most of this in your own installation. Perhaps use a virtual machine for that.
  • Document on your blog and use the hashtag #tools04

Featured Image Credit

Photo of ingots and a forge
Forge flickr photo by acciarini shared under a Creative Commons (BY-NC) license

Tools 03 – John the Ripper

Your Challenge

  • Setup your own installation of John the Ripper
  • You can use your account on our Linux server, ask Ken for access
  • What passwords did you crack from the file shared (and pinned) in our Slack channel?
  • Write about the tool and your investigation on good password maintenance.
  • Document the process on your blog as a blog post with tag #tools03

Featured Image Credit

Image showing a wifi password "lotsofsnow"
Wifi Password 30/365 flickr photo by shareski shared under a Creative Commons (BY-NC) license

i-WSQ – Week 5 (Wednesday)

Security architecture and policies

Before Class

Please view this content before class and come prepared for discussions.

Featured Image

Gorgeous computer fixings: the Sun Sparcstation 330 motherboard smart fix (1989)
Gorgeous computer fixings: the Sun Sparcstation 330 motherboard smart fix (1989) flickr photo by J.L. Briz shared under a Creative Commons (BY-NC-ND) license

i-WSQ – Week 5 (Monday)

Risk management, and assessment

Before Class

Please view this content before class and come prepared for discussions.

Featured Image

Image of icons to represent securing of computer data
Secure Data – Cyber Security – flickr photo by perspec_photo88 shared under a Creative Commons (BY-SA) license

Tools 02 – Encrypt your Drive

Your Challenge

  • Do an inventory of external data storage you have.
  • Look for options to encrypt that data.
  • What options did you find?
  • What trade-offs are involved here?
  • Implement at least one of them.
  • Document the process here as a blog post with tag #tools02

Featured Image Credit

Picture of many usb thumb drives.
2017/365/127 Ready for another exam tomorrow. flickr photo by kenbauer shared under a Creative Commons (BY-NC-SA) license

Tools 01 – PGP

Your Challenge

  • Setup your own PGP private/public key pair.
  • Share your credentials with a colleagues (securely)
  • Encrypt a message to a colleague.
  • Sign a file and send to a colleague.
  • Have your colleague do the same so you can decrypt and check signatures.
  • Document the process here as a blog post with tag #tools01

Feature Image Credit

Picture of multiple locks on a chain holding a gate.
Multiple Locks flickr photo by mikecogh shared under a Creative Commons (BY-SA) license