10. Analyze Vulnerabilities and Threats Exercise
Analyze Vulnerabilities and Threats Exercise
Student Lab Setup
For this exercise, you'll continue to use the Windows 10 virtual PC CYBERND01PRJ01 to identify real or potential vulnerabilities. In particular, you want to look for shared files/folders, unneeded Windows services, and unpatched applications.
Sign in to the Windows 10 virtual PC provided with this class and complete the exercises below. If you don't know how to get remote control of the virtual PC, please follow Step 4. Return to lab VM in the document Setup Student LAB
- Username: cyberadmin
- Password: @UdacityLearning#1
IMPORTANT: Please always remember to shut down ALL of the virtual machines when not in use to avoid charges! The status of ALL virtual machines should be stopped!
Part 1: Shared Folders and Files
Shared Folders and Files
QUESTION:
Right-click on the Windows Start icon and select "Computer Management." In that window, select the > symbol next to "Shared Folders" and click on "Shares." This shows the files or folders shared on this PC. Is there any shared folder? What is the name of the shared folder if there is any? Who are the people the folder is shared with?
As part of a security assessment, you should review the file shares to ensure they are appropriate and that only those who need access have it.
ANSWER:
In the Identity and Access Control Exercise, you created a shared folder. You should see it in the Share Name column.
Part 2: Windows Services
Windows Services
QUESTION:
In the Computer Management window, click on the > symbol next to "Services and Applications." Select "Services" to see the services available on this PC. You can also search for "Services" in the Windows run bar. Click on a specific service to learn more about it. For example, click on the "Geolocation Service" to see how this tracks the location of the PC. In the space below, document 2-3 services running on this PC.
ANSWER:
You'll see there are many services running by default on a Windows PC. As a beginning IT or Cybersecurity student, you're not expected to know what all of these services mean. Use the description to learn more about each. This is a good opportunity to familiarize yourself with typical services.
Part 3: Windows and Application Updates
Windows and Application Updates
QUESTION:
The last step in this exercise is to ensure applications and the operating system are all up-to-date on patches. Let's start with applications.
You need to make sure the Windows Operating System is up-to-date and that it will automatically be updated when patches are available from Microsoft. To do that, type "Update" from the Windows start bar. Click on "Check for updates" in System Settings. The "Windows Update" window will show you if this PC needs updates to any operating system component. At the bottom of the page, click on "Advanced options" to see the different options available for installing updates. Record your observations about Windows updates below.
Next, on the Windows 10 PC, search for "Control Panel" and click on it to open its window. From there, select "Programs" and then "Programs and Features" to see a list of applications or programs installed on the PC along with its version. Ensure all applications are at the latest version. You can also uninstall applications using this window. Record any applications that need to be updated in the field below.
ANSWER:
Student's answers may vary because applications and operating systems are continually updating. It's one of the best ways to reduce the likelihood of software vulnerabilities from impacting your work.
IMPORTANT: Please always remember to shut down ALL of the virtual machines when not in use to avoid charges! The status of ALL virtual machines should be stopped!