Task-1:-PGP………………………………………………Page-5-To-14
Problem statement……………………………………………
- Download PGP Desktop software………………………..
- Experiment with new installation using the following features:
1.Key management ……………………………………..
2.Securing E-mail Messages ……………………………
3.Securing Instant Messaging ………………………….
c) Experiment and report on the remaining option available under
the licence……………………………………………..
Task-2:- TCP/IP Security…………………………………Page-15-To-20
Problem statement…………………………………………
- Why TCP/IP Network are considered unsecured…….
- Describe the following technologies:
- SSL (Secure Socket Layer)…………………..
- IPSec (IP Security)………………………….
Task-3:- Hardware and software…………………………Page-21-To-26
Problem statement…………………………………………
- Differences between Windows NT,Windows XP and UNIX
- Differences between HIDS and NIDS
Task-4:- Buffer overruns…………………………………Page—27-To-32
Problem statement…………………………………………
- How a variety of overruns and format string bugs can alter the program flow on program.
- Five methods of causing havoc by unauthorized altering of memory using a buffer overflow.
- ONE well-recognized method of preventing buffer overflow.
Solution Task-1
Experiment with new installation using the following features:
1.Key management
2.Securing E-mail Messages
3.Securing Instant Messaging
When managed by a PGP Universal Server, PGP Desktop 9.x provides a secure recovery mechanism for private keys, called KeyReconstruction. As its name suggests, Key
Reconstruction can be used to reconstruct (or restore) your private Key if you have forgotten its passphrase, or if you have deleted your private Key
.
To take advantage of Key Reconstruction, you send Key reconstruction data to a reconstruction server (a PGP Universal Server that is managing your PGP Desktop) while you still have your private Key and remember its passphrase. The reconstruction data for your private Key consists of five questions, that you may create, and five answers that only you know. After you have sent your reconstruction questions and answers to the server, you may reconstruct your private Key at any time by answering 3 of the 5 questions correctly. If you have deleted your private Keyor forgotten its passphrase before sending reconstruction questions and answers to the server, you cannot regain your private Key using KeyReconstruction.
If you need help understanding any of the concepts mentioned above, please read the following "Crypto Concepts" section. Otherwise, feel free to skip down and Reconstruct your private Key
Crypto Concepts
Private Key
When you install PGP Desktop you are prompted to create a keypair, which is comprised of two related keys: a public Key and a private Key Your private Key is used for decrypting something that was encrypted using your related public Key, as well as generating digital signatures that can be verified using your public Key
As its name suggests, your private Key.
- should be kept totally private, and should be protected by a strong passphrase.
Key
Reconstruction
For detailed technical information about Key
Reconstruction, please refer to the white paper "Inside PGP Key
Reconstruct Your Private Key
- Click the PGP Tray lock icon in your system tray and then click Open PGP Desktop:
- Click the PGP Keys control box.
Select the keyring that contains your Key
Click the Key
- that you wish to reconstruct:
To reconstruct a private Key, you must have its associated public Key
on your keyring. If you don't have a copy of your public Key, you might try downloading it from a Keyserver, such as your PGP Universal Server or the PGP Global Directory. Otherwise, contact your administrator to obtain a copy of your public Key
- Now click the Keys menu and click Reconstruct:
Answer 3 of the 5 Key
- reconstruction questions correctly, then click OK:
The answers are case sensitive, and must be entered precisely as they were when you first sent them to the server. If you are certain that nobody can see your screen, you might want to check the box labeled Show Keystrokes, so that you can verify your answers.
After you have answered 3 of the 5 Key reconstruction questions correctly, you must enter and confirm a new passphrase for your private Key
When you are notified that Key
- reconstruction was successful, click OK:
- 2.Securing Email Messages
When PGP Messaging is enabled, you will find that PGP will begin encrypting your E-mail
accounts by default. This will occur when you open your E-mail application for the first time after installing PGP Desktop 9.x, and you send/receive E-mail. If you are communicating with other PGP users through E-mail PGP Desktop can automatically encrypt and sign Messages
to PGP users depending on the policies that have been set within PGP Desktop under the Messaging section.
PGP Desktop does configure default policies if you do not wish to create your own. These default encryption policies will be reviewed in Section 3 of this document. New encryption policies will be described in Section 4 of this document.
Enable PGP Messaging
PGP Messaging is enabled by default during installation. However, if you disabled PGP Messaging during installation, there are two ways to enable this feature. They are as follows:
Locate the PGP Desktop icon (padlock) in the system tray. Click the PGP Desktop padlock and click Use PGP E-mail
- Proxy. The option will have a black check mark next to it when it is enabled.
Open PGP Desktop through the Programs/All Programs menu and select the Tools menu. Click Use PGP E-mail
- Proxy. The option will have a black check mark next to it when it is enabled.
Assign a PGP Key to a PGP Messaging Service
PGP Messaging requires a PGP Key to secure the E-mail
account(s). To assign a key to a messaging service for the first time, do the following:
When you open your E-mail
application for the first time after installing PGP Desktop, PGP will display the "E-mail
- Account Detected" window after sending/receiving mail.
Select Yes, secure this E-mail
- account, and then click Next.
- You may select one of many key sources. If you created a key pair during installation, then generally, the option you would select is PGP Desktop Key. You can also create a new key pair, or import a previously exported key pair.
- After choosing the source, click Next.
Highlight the key to be used for this E-mail
Click Finish. You are now ready to encrypt mail through this E-mail
- account and proceed with section 3.
Review Default E-mail
Encryption Policies
Two encryption policies are set by default. These policies are:
Require Encryption: [PGP] Confidential.
This policy specifies that any message flagged as confidential in your E-mail
- client or containing the text "[PGP]" in the subject line must be encrypted to a valid recipient public key or it cannot be sent.
Opportunistic Encryption.