Professional Documents
Culture Documents
COLLAGE OF INFORMATICS
DEPARTEMENT OF INFORMATION
TECHNOLOGY
By
1. Samuel Fikadu..................................................0645/09
2. Tareka Gutema..................................................0656/09
3. Ambisa Turuneh.................................................0614/09
4. Meseret Hirkisa…………………………………0638/09
5. Yonas Kebeda………………………………….0658/09
1|Page
1. Explain Group Policy In Detail Using Different Example?
Administrative templates consist of two components. An ADMX file is the XML file containing
all of the Group Policy settings that are associated with the template. A corresponding ADML
2|Page
file acts as a language file that allows the Group Policy settings to be displayed in the
administrator’s language of choice.
Many organizations use a combination of local and Active Directory Group Policy objects. The
local policy settings provide security when the user is not logged into a domain, while Active
Directory Group Policy objects apply once the user has logged in.
3|Page
AM processes include Application Lifecycle Management (ALM), Application Portfolio
Management (APM) and Application Performance Management (AP
Group Policies also install software and run startup and login scripts
4|Page
Command Prompts can be used to run commands that give high-level access to users and evade
other restrictions on the system. So, to ensure system resources’ security, it’s wise to disable
Command Prompt.
After you have disabled Command Prompt and someone tries to open a command window, the
system will display a message stating that some settings are preventing this action.
5|Page
Setting a lower value for minimum password length creates unnecessary risk. The default setting
is “zero” characters, so you will have to specify a number:
If you get these Group Policy settings correct, your organization’s security will automatically be
in a better state. Please make sure to apply the modified Group Policy Object to everyone and
update the Group Policies to reflect them on all domain controllers in your environment.
6|Page
Forward lookup zone contains a mapping between host names and IP addresses.
When a computer requests an IP address by providing a host name (that is more user
friendly), the forward lookup zone is queried to find the IP address for the given host
name.
For example, when you type www.cnn.com in your browser, the forward lookup
zone will be queried and the IP address 157.166.255.19 will be returned, which is
actually the IP address of that site.
When a forward lookup is sent to the DNS server, the DNS server searches for an A
type resource record associated with the host name provided by the request. An A
type resource is a DNS record that can be used to point the domain name and host
names to a static IP address.
If the DNS server finds a matching A type resource record, it will return that to the
client, else it will forward the query to another DNS server.
Reverse lookup zone contains a mapping that relates IP addresses to host names.
When a computer requests for a domain name by providing an IP address, the reverse
lookup zone is queried to find the host name for the IP address given.
For example, if a client wants to find the host name for the IP address
157.166.255.19, the reverse lookup zone will be queried and it will return the host
name www.cnn.com. The reverse lookup zone contains PTR resource records.
A PTR record allows doing a reverse lookup by pointing the IP address to a
host/domain name. When doing reverse lookups, these PTR records are used to point
to A resource records.
What is the difference between Reverse Lookup Zone and Forward Lookup
Zone?
7|Page
The main difference between forward lookup zone and reverse lookup zone is that
forward lookup zone is used to resolve forward lookup queries where the client requests
an IP address by providing the host name, while reverse lookup zone is used for resolving
reverse lookup queries where a client requests a host name by providing an IP address.
The forward lookup zone contains A type resource records that can point out an IP
address for a given host name. The reverse lookup zone contains PTR records that can
point out a host name for a given IP address.
Windows Server 2016 includes DHCP Server, which is an optional networking server role that
you can deploy on your network to lease IP addresses and other information to DHCP clients.
All Windows-based client operating systems include the DHCP client as part of TCP/IP, and
DHCP client is enabled by default.
Every device on a TCP/IP-based network must have a unique unicast IP address to access the
network and its resources. Without DHCP, IP addresses for new computers or computers that are
moved from one subnet to another must be configured manually; IP addresses for computers that
are removed from the network must be manually reclaimed.
With DHCP, this entire process is automated and managed centrally. The DHCP server
maintains a pool of IP addresses and leases an address to any DHCP-enabled client when it starts
up on the network. Because the IP addresses are dynamic (leased) rather than static (permanently
assigned), addresses no longer in use are automatically returned to the pool for reallocation.
The network administrator establishes DHCP servers that maintain TCP/IP configuration
information and provide address configuration to DHCP-enabled clients in the form of a lease
offer. The DHCP server stores the configuration information in a database that includes:
8|Page
Reserved IP addresses associated with particular DHCP clients. This allows consistent
assignment of a single IP address to a single DHCP client.
The lease duration, or the length of time for which the IP address can be used before a
lease renewal is required.
Benefits of DHCP
9|Page
Proxy servers have many different uses, depending on their configuration and type. Common
uses include facilitating anonymous Internet browsing, bypassing geo-blocking, and regulating
web requests.
Like any device connected over the Internet, proxies have associated cybersecurity risks that
users should consider before use.
2. Encryption: proxy server that implement encryption such as SSL for web site.
4. Security: in many cases proxy severs are security front ends that protect webservers
from certain types of information security threats.
6. Caching: proxies that cache static content or web sites such as videos, images, scripts
and html.
8. Filtering: proxies can be used to prevent users from connecting to web sites or other
service based on a configurable police.
9. Logging: a proxy can be used to record network traffic for audit trail or motives such as
eavesdropping.
10. Performance: proxy can be designed to speed up network service such as DNS queries
used by web browsers to look up the IP address of web site.
10 | P a g e
How Does a Proxy Server Work?
Proxy servers work by facilitating web requests and responses between a user and web server.
Typically, a user accesses a website by sending a direct request to its web server from a web
browser via their IP address. The web server then sends a response containing the website data
directly back to the user.
A proxy server acts as an intermediary between the user and the web server. Proxy servers use a
different IP address on behalf of the user, concealing the user's real address from web servers.
11 | P a g e
5.What is a VPN?
A VPN (virtual private network) is a service that creates a safe, encrypted online
connection. Internet users may use a VPN to give themselves more privacy and
anonymity online or circumvent geographic-based blocking and censorship. VPNs
essentially extend a private network across a public network, which should allow a user
to securely send and receive data across the internet.
Typically, a VPN is used over a less secure network, such as the public internet. Internet
service providers (ISPs) normally have a rather large amount of insight into a customer's
activities. In addition, some unsecured Wi-Fi access points (APs) may be a convenient
avenue for attackers to gain access to a user's personal data. An internet user could use a
VPN to avoid these encroachments on privacy.
VPNs can be used to hide a user's browser history, Internet Protocol (IP) address and
geographical location, web activity or devices being used. Anyone on the same network
will not be able to see what a VPN user is doing. This makes VPNs a go-to tool for online
privacy.
12 | P a g e
A VPN uses tunneling protocols to encrypt data at the sending end and decrypts it at the
receiving end. The originating and receiving network addresses are also encrypted to
provide better security for online activities.
VPN apps are often used to protect data transmissions on mobile devices. They can also
be used to visit websites that are restricted by location. Secure access through a mobile
VPN should not be confused with private browsing, however. Private browsing does not
involve encryption; it is simply an optional browser setting that prevents identifiable user
data from being collected.
By using a VPN tunnel, a user's device will connect to another network, hiding its IP
address and encrypting the data. This is what will hide private information from attackers
or others hoping to gain access to an individual's activities. The tunnel will connect a
user's device to an exit node in another distant location, which makes it seem like the user
is in another location.
VPNs also can be used to provide remote employees, gig economy freelance workers and
business travelers with access to software applications hosted on proprietary networks.
To gain access to a restricted resource through a VPN, the user must be authorized to use
13 | P a g e
the virtual private network and provide one or more authentication factors. These can be
passwords, security tokens or biometric data.
When surfing the web, an internet user could have information accessed by an attacker,
including browsing habits or IP address. If privacy is a concern, a VPN can provide users
with peace of mind. Encryption, anonymity and the ability to get around geographically
blocked content is what most users find valuable in a VPN.
The ability to get around blocked content from another country, for example, might be
extremely useful for journalists. For example, if a country is likely to block internet
content from foreign entities, journalists could use a VPN to look like they are within that
country.
VPN protocols
VPN protocols ensure an appropriate level of security to connected systems when the
underlying network infrastructure alone cannot provide it. Several different protocols can
be used to secure and encrypt data. They include the following:
IP Security (IPsec)
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
OpenVPN
Benefits and challenges of using a VPN
Benefits of using a VPN include the following:
14 | P a g e
Paid VPNs are more trusted, secure options.
A VPN may slow down internet speeds.
VPN Examples
Health Care Company Intranet Deployment. Here we have a health care company
that’s deploying an intranet. Well, why would they care so much about security?
telecommuters. ...
Traditional Dialup versus Access VPN. To illustrate the savings an Access VPN can
provide, compare the cost of implementing one with that of supporting a dial-up remote
access application.
15 | P a g e
16 | P a g e