IntermediatePatriot - A Look Into Ethics and Computer OS Security (Linux & Windows)

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/ezgif-1-599eaa3342.gif

Note

★ This page is based on unit 3, 7, 8, 9 and 10 of the official CyberPatriot learning material ★

Virtual Online Linux Terminal

Introduction To Cyber Ethics

Cyber Ethics - Doing the right thing with computer technology!

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/how-to-become-an-ethical-hacker.png

★Core Knowledge★ - We need computer ethics to differentiate from what’s right and wrong. The technology we used today can be easily misused and can become an easy security threat, not for just people, but entire network infrastructures as well. The tools we utilize should always be used for good, to help others with tasks like safe data recovery, basic computer repair, network organization and security hardening. Also, if you see something, say something. It could be a life altering issue that needs to be handled correctly. Be more of a White Hat hacker over a black hat one, bring peace not war!(More information can be found above in the Unit 3 learning material section of this page)

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/istockphoto-941665020-612x612.jpg

Things you should never do: (4 Major Nevers)

  1. Never use a computer to steal from others. (Stealing bank details, scamming through emails)

  2. Never use a computer to harm others. (Whether it is on a personal level or damaging another person’s hardware)

  3. Never use a computer to illegally copy licensed software. (Software you haven’t subbed or purchased)

  4. Never use a computer’s resources without the correct permissions from authority. (Always ask first)

Windows Security – A Look Into Windows Security and Vulnerabilities

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/7.jpg https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/01fjk76Hzv5cska2LPEyhog-24.fit_lim.size_1152x.png

Software Security NOTE: It’s always smart to regularly install security updates for Windows through its Windows security applet. This can also be done with other 3rd party security suites as well. Windows Defender is preinstalled on most computers, these days, and offers comprehensive tools to keep your PC safe. 3rd party alternatives, like BitDefender and Malware Bytes, do a great job as well.

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/wdav-protection-settings-wdsc.png

Software security Recommendation: As a built-in malware scanner for Microsoft Windows, Microsoft Defender Antivirus will look for any files or programs, on your computer, that could harm it as part of the Windows Security suite. Defender scans email, apps, the cloud, and the web for software threats, including viruses and other malware. It’s also, constantly, updating with new securitry definitions to fix critical Windows exploits.

Software security Recommendation: Bitwarden is a free and open-source password protection program that keeps private information, including login details for sites on the internet, in an encrypted vault.

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/12.jpg

Setting Up Ubuntu Linux OS (On a Virtual Machine)

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/ubuntumaxresdefault.jpg

Core Knowledge: Ubuntu is an open-source operating system (OS) built on the Debian GNU/Linux distribution. Ubuntu offers a more secure and private operating system. The main benefit of using Ubuntu is that, we can get the extra security and privacy, we need without using any third-party solutions. By using this Linux distribution, the risk of hackers breaking into our PC’s servers and, especially, virtual machines, is minimal to almost non-exsistant with certian useful techniques.

Installing Ubuntu OS Onto VMWare (Creating a Virtual Machine)

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/ubuntuonvmware.jpg

Step 1: Download the Ubuntu OS ISO file from the appropriate official web page.

Ubuntu Linux Download (Operating System): https://ubuntu.com/download

Step 2: Download and Install the VMWare Player application on your PC/Linux Machine.

VMWare Player (Virtual Machine Software): https://www.vmware.com/products/workstation-player.html

Step 3: Click the Player -> File -> New Virtual Machine OR Create a New Virtual Machine Link then choose the option, “I will install the operating system later”.

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/2-t24x7-ubuntu-vmware-add-virtual-machine.png https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/3-t24x7-ubuntu-vmware-add-vm-welcome.png

Step 4: Click the Next Button to choose the Operating System. (Linux and Version: Ubuntu)

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/4-t24x7-ubuntu-vmware-select-guest-os.png

Step 5: Now click the Next Button to configure virtual machine name and installation path.

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/5-t24x7-ubuntu-vmware-vm-configure.png

Step 6: Click the Next Button to configure the disk and allocate space, make sure its not less than 15GB.

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/6-t24x7-ubuntu-vmware-vm-configure.png

Step 7: For this next step, go ahead and click the “finish” button to finish setting up your VM.

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/7-t24x7-ubuntu-vmware-vm-settings.png

Step 8: Select the Ubuntu Linux ISO downloaded on your PC.

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/Screenshot%202023-01-20%20073111.png

Step 9: Press the green play button to finish and boot Ubuntu OS. (You should see the logo for the OS)

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/10-t24x7-ubuntu-vmware-vm-play.png

Why Linux OS is so secure over Microsoft Windows! (Comparison)

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/13.jpg

Windows Security Always Has User Error, Linux Can HELP!

★Core Knowledge★ - Windows will generate an administrator account for you when you install it, giving you complete control, to do pretty much whatever you want, with the operating system, by using the mysterious “Run as administrator” options. On the other hand, Linux does not permit such permissions by default; you are free to use your home directory, but you must enter the root password, each time you want, to perform a system-level activity. Here’s the thing: With the right configuration, Windows can be just as safe as Linux. However, for decades, Windows’ default installation has handled user permissions incorrectly and at risk.

A user can easily run a program, as administrator, on Windows. While on Linux, you have to enter the root password whenever you want to do so. In this way, you can notice when a script or a program tries to do something system-wide.

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/14.jpg https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/15.jpg

Installation on Linux is SECURE and getting easier to use!

★Core Knowledge★ - Users, typically, utilize the internet to search for an EXE or MSI file, download it, and install software on Windows. Due to the uncertainty surrounding, this source’s reliability, there is a significant security risk. On the other hand, Linux makes use of a tool called a package manager. Simply defined, a package manager, is in charge of obtaining the packages you require from reliable sources, known as repositories. Much of the time, the community manages repositories, and the verification and acceptance process for packages is laborious. They, also, simplify things for the user, because there is no need to browse the internet or look up files to download; all you need to do is type a short command. Most popular package installer stores are Ubuntu Software Center and PLING, which are the biggest repositories of apps ever.

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/16.jpg

Note

Pling is the largest and most popular Linux-based app market, that has multiple sets of themes, apps, and extensions, for various flavors of Linux distros.

★Core Knowledge★ - Users, typically, utilize the internet to search for an EXE or MSI file, download it, and install software on Windows. Due to the uncertainty surrounding, this source’s reliability, there is a significant security risk. On the other hand, Linux makes use of a tool called a package manager. Simply defined, a package manager, oversees obtaining the packages you require from reliable sources, known as repositories. Most of the time, the community manages repositories, and the verification and acceptance process for packages is laborious. They, also, simplify things for the user, because there is no need to browse the internet or look up files to download. All you need to do is type a short command.

Useful Basic Linux Commands

Linux Commands

Command

Explanation

Example

sudo

Used before a command to run as root or an administrator.

sudo apt-get update

ls

List directories and files in the current or specified directory.

ls, ls desktop

ls -l

Long listing with additional file details.

ls -l, ls -l Desktop

cd

Change directory; move to another directory.

cd, cd Downloads

rm

Remove; delete files.

rm useless_file

mv

Move; move a file to a different location.

mv file.txt /path/to/new/location/

dir

List all directories or folders in the current directory.

dir, dir Downloads

mkdir

Make directory; create new directories/folders.

mkdir new_folder

apt

Install, remove, and manage packages in Ubuntu (requires sudo).

Install: sudo apt install new_file``<br> Remove: ``sudo apt remove daniel_sharpiro``<br> Update System: ``sudo apt update && sudo apt upgrade

sudo apt-get update

Fetch the latest version of each package without downloading or installing updates.

sudo apt-get update

sudo apt-get upgrade

Download and install updates for each outdated package and dependency.

sudo apt-get upgrade

ip a

Find the IP address of a computer.

ip a

ifconfig

Display networking information about a computer.

ifconfig

clear

Clear the terminal screen.

clear

exit

Exit the terminal.

exit

shutdown -now

Shutdown the computer immediately.

shutdown -now

Setting up Proton VPN on Windows OS

★Core Knowledge★ - What is Proton VPN? Your Internet connection is encrypted while you browse the internet with Proton VPN. The robust security features of Proton VPN, ensures that an intruder cannot eavesdrop on your connection, by routing it through encrypted tunnels. Additionally, it enables you to visit websites that may be restricted in your region.

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/76.jpg

Note

Install the program like you would with any other program.

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/77.jpg

Note

Now sign in/create an account to use with the software.

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/78.jpg https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/79.jpg https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/80.jpg https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/81.jpg https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/82.jpg

IntermediatePatriot CyberQuiz (Beta)

IntermediatePatriot CyberVideos

https://raw.githubusercontent.com/natt96z/cybersac/main/docs/img/video-camera-icon-set-in-black-and-white-colors-movie-symbol-illustration-vector.jpg

This section is based on material introduced in this difficulty of the website, these videos provide interesting in-depth tutorials and summaries of the material described above. Also please note, video material is subject to change.


Microsoft Windows OS CyberLab

This section is dedicated to providing easy to understand PowerPoint lecture tutorials for our labs, this covers securing the Windows OS material. Material provided here is subject to change and click on the black arrows to view material.

Lecture Tutorial Material #1

Ubuntu Linux OS CyberLab

Lecture Tutorial Material #1
Lecture Tutorial Material #2

Widget is loading comments...