IntermediatePatriot - A Look Into Ethics and Computer OS Security (Linux & Windows)¶

Note
★ This page is based on unit 3, 7, 8, 9 and 10 of the official CyberPatriot learning material ★
Virtual Online Linux Terminal¶
Introduction To Cyber Ethics¶
Cyber Ethics - Doing the right thing with computer technology!¶

★Core Knowledge★ - We need computer ethics to differentiate from what’s right and wrong. The technology we used today can be easily misused and can become an easy security threat, not for just people, but entire network infrastructures as well. The tools we utilize should always be used for good, to help others with tasks like safe data recovery, basic computer repair, network organization and security hardening. Also, if you see something, say something. It could be a life altering issue that needs to be handled correctly. Be more of a White Hat hacker over a black hat one, bring peace not war!(More information can be found above in the Unit 3 learning material section of this page)

Things you should never do: (4 Major Nevers)
Never use a computer to steal from others. (Stealing bank details, scamming through emails)
Never use a computer to harm others. (Whether it is on a personal level or damaging another person’s hardware)
Never use a computer to illegally copy licensed software. (Software you haven’t subbed or purchased)
Never use a computer’s resources without the correct permissions from authority. (Always ask first)
Windows Security – A Look Into Windows Security and Vulnerabilities¶


Software Security NOTE: It’s always smart to regularly install security updates for Windows through its Windows security applet. This can also be done with other 3rd party security suites as well. Windows Defender is preinstalled on most computers, these days, and offers comprehensive tools to keep your PC safe. 3rd party alternatives, like BitDefender and Malware Bytes, do a great job as well.

Software security Recommendation: As a built-in malware scanner for Microsoft Windows, Microsoft Defender Antivirus will look for any files or programs, on your computer, that could harm it as part of the Windows Security suite. Defender scans email, apps, the cloud, and the web for software threats, including viruses and other malware. It’s also, constantly, updating with new securitry definitions to fix critical Windows exploits.
Software security Recommendation: Bitwarden is a free and open-source password protection program that keeps private information, including login details for sites on the internet, in an encrypted vault.

Setting Up Ubuntu Linux OS (On a Virtual Machine)¶

Core Knowledge: Ubuntu is an open-source operating system (OS) built on the Debian GNU/Linux distribution. Ubuntu offers a more secure and private operating system. The main benefit of using Ubuntu is that, we can get the extra security and privacy, we need without using any third-party solutions. By using this Linux distribution, the risk of hackers breaking into our PC’s servers and, especially, virtual machines, is minimal to almost non-exsistant with certian useful techniques.
Installing Ubuntu OS Onto VMWare (Creating a Virtual Machine)

Step 1: Download the Ubuntu OS ISO file from the appropriate official web page.
Ubuntu Linux Download (Operating System): https://ubuntu.com/download
Step 2: Download and Install the VMWare Player application on your PC/Linux Machine.
VMWare Player (Virtual Machine Software): https://www.vmware.com/products/workstation-player.html
Step 3: Click the Player -> File -> New Virtual Machine OR Create a New Virtual Machine Link then choose the option, “I will install the operating system later”.


Step 4: Click the Next Button to choose the Operating System. (Linux and Version: Ubuntu)

Step 5: Now click the Next Button to configure virtual machine name and installation path.

Step 6: Click the Next Button to configure the disk and allocate space, make sure its not less than 15GB.

Step 7: For this next step, go ahead and click the “finish” button to finish setting up your VM.

Step 8: Select the Ubuntu Linux ISO downloaded on your PC.

Step 9: Press the green play button to finish and boot Ubuntu OS. (You should see the logo for the OS)

Why Linux OS is so secure over Microsoft Windows! (Comparison)¶

Windows Security Always Has User Error, Linux Can HELP!
★Core Knowledge★ - Windows will generate an administrator account for you when you install it, giving you complete control, to do pretty much whatever you want, with the operating system, by using the mysterious “Run as administrator” options. On the other hand, Linux does not permit such permissions by default; you are free to use your home directory, but you must enter the root password, each time you want, to perform a system-level activity. Here’s the thing: With the right configuration, Windows can be just as safe as Linux. However, for decades, Windows’ default installation has handled user permissions incorrectly and at risk.
A user can easily run a program, as administrator, on Windows. While on Linux, you have to enter the root password whenever you want to do so. In this way, you can notice when a script or a program tries to do something system-wide.


Installation on Linux is SECURE and getting easier to use!
★Core Knowledge★ - Users, typically, utilize the internet to search for an EXE or MSI file, download it, and install software on Windows. Due to the uncertainty surrounding, this source’s reliability, there is a significant security risk. On the other hand, Linux makes use of a tool called a package manager. Simply defined, a package manager, is in charge of obtaining the packages you require from reliable sources, known as repositories. Much of the time, the community manages repositories, and the verification and acceptance process for packages is laborious. They, also, simplify things for the user, because there is no need to browse the internet or look up files to download; all you need to do is type a short command. Most popular package installer stores are Ubuntu Software Center and PLING, which are the biggest repositories of apps ever.

Note
Pling is the largest and most popular Linux-based app market, that has multiple sets of themes, apps, and extensions, for various flavors of Linux distros.
★Core Knowledge★ - Users, typically, utilize the internet to search for an EXE or MSI file, download it, and install software on Windows. Due to the uncertainty surrounding, this source’s reliability, there is a significant security risk. On the other hand, Linux makes use of a tool called a package manager. Simply defined, a package manager, oversees obtaining the packages you require from reliable sources, known as repositories. Most of the time, the community manages repositories, and the verification and acceptance process for packages is laborious. They, also, simplify things for the user, because there is no need to browse the internet or look up files to download. All you need to do is type a short command.
Useful Basic Linux Commands¶
Linux Commands¶
Command |
Explanation |
Example |
---|---|---|
|
Used before a command to run as root or an administrator. |
|
|
List directories and files in the current or specified directory. |
|
|
Long listing with additional file details. |
|
|
Change directory; move to another directory. |
|
|
Remove; delete files. |
|
|
Move; move a file to a different location. |
|
|
List all directories or folders in the current directory. |
|
|
Make directory; create new directories/folders. |
|
|
Install, remove, and manage packages in Ubuntu (requires sudo). |
Install: |
|
Fetch the latest version of each package without downloading or installing updates. |
|
|
Download and install updates for each outdated package and dependency. |
|
|
Find the IP address of a computer. |
|
|
Display networking information about a computer. |
|
|
Clear the terminal screen. |
|
|
Exit the terminal. |
|
|
Shutdown the computer immediately. |
|
Setting up Proton VPN on Windows OS¶
★Core Knowledge★ - What is Proton VPN? Your Internet connection is encrypted while you browse the internet with Proton VPN. The robust security features of Proton VPN, ensures that an intruder cannot eavesdrop on your connection, by routing it through encrypted tunnels. Additionally, it enables you to visit websites that may be restricted in your region.

Note
Install the program like you would with any other program.

Note
Now sign in/create an account to use with the software.





IntermediatePatriot CyberQuiz (Beta)¶
IntermediatePatriot CyberVideos¶

This section is based on material introduced in this difficulty of the website, these videos provide interesting in-depth tutorials and summaries of the material described above. Also please note, video material is subject to change.
Microsoft Windows OS CyberLab¶
This section is dedicated to providing easy to understand PowerPoint lecture tutorials for our labs, this covers securing the Windows OS material. Material provided here is subject to change and click on the black arrows to view material.