Use encrypting file system to encrypt directories and files

Assignment Help Basic Computer Science
Reference no: EM131413474

Hands-On Project 5-3: Using the Cipher Command

Objective: Use the Encrypting File System to encrypt directories and files.

Description: In this project, you use the cipher command to investigate the functions of the Encrypting File System (EFS) in Windows 7 or Windows Server 2008. EFS requires that users have an EFS digital certificate for encrypting and decrypting files and directories. Users who do not have an EFS certificate have one created automatically the first time they encrypt a file. Users can choose from certificates to allow other users to access encrypted files.

1. Log on either to the Windows Server 2008 or Windows 7 computer as the Teamx administrator.

2. Open a command prompt, type cd \ and press Enter.

3. Create a directory called Private by typing mkdir Private and pressing Enter. Type cd Private and press Enter to change to the Private directory.

4. Create a file called SecretFile.txt by typing copy con SecretFile.txt and pressing Enter. Note that you have not returned to the command prompt; you are still in the file-creating mode.

5. Type This is a secret file. Press Enter, press Ctrl+Z, and then press Enter to end the file. Type dir and press Enter to verify that the file exists. Type type SecretFile.txt to verify the contents of the file.

6. Type cd .. and press Enter to return to the parent directory (C:\). Type cipher and press Enter to display the encryption status for the contents of C:\. Notice that no files or directories are encrypted, as indicated by the "U" (for "unencrypted") that precedes each listing.

7. Type cipher /? and press Enter to see the cipher command help file.

8. Type cipher /E Private and press Enter to encrypt the Private directory. Type cipher and press Enter to verify that the Private directory has been encrypted.

9. Type type \Private\SecretFile.txt to verify that you can still access the file.

10. Create a new file in the Private directory named SecretFile2.txt. Type copy con C:\Private\SecretFile2.txt and press Enter. Type This is also a secret file. Press Enter, press Ctrl+Z, and then press Enter to end the file. Verify that the SecretFile2.txt file exists and that its content is "This is also a secret file."

11. Type cd Private and press Enter. Type cipher and press Enter to see the encryption status of the two files.

12. On the Windows Server 2008 computer, create a domain user named Shifty Smith with a logon name of ssmith and a password of Pa$word. Log off either computer, and then log on as Shifty Smith. 13. Open a command prompt, and change to the C:\Private directory. Enter the type command in an attempt to display the contents of SecretFile.txt and SecretFile2.txt. You should be denied access to SecretFile2.txt.

14. Log out and then log on as the Teamx administrator. Open a command prompt, and change to the C:\Private directory.

15. Type cipher /C and press Enter to see details about the encrypted file, including which users can decrypt the file.

16. Click Start, click Computer, double-click Local Disk (C:), and double-click Private. (Note that Private is shown in green to indicate that it is encrypted.) Right-click SecretFile2.txt, click Properties, click Advanced, click Details, and click Add. Note that Shifty Smith does not have an EFS digital certificate to select, which means that you cannot give Shifty the ability to see the encrypted file.

17. Log off and then log on as Shifty Smith. Right-click the desktop, click New, click Text Document, and name the document Shifty. Right-click the document, click Properties, click Advanced, check the Encrypt contents to secure data box, and click OK. Click OK again. In the Encryption Warning window, click the Encrypt the file only option button, and click OK. Log out.

18. Log on as the Teamx administrator. Repeat Step 16; this time you should see Shifty's EFS certificate. Select it and then click OK four times. Log out.

19. Log on as Shifty Smith, and repeat Step 13. This time you should have access to SecretFile2.txt. Type cipher /C and press Enter. Note that Shifty now is listed as having the ability to decrypt SecretFile2.txt.

20. Close all windows and log out of both systems.

Reference no: EM131413474

Questions Cloud

How the dnssec system can help to prevent these attacks : You have been asked to prepare a two-page report that explains how DNS cache poisoning attacks work and how the DNSSEC system can help to prevent these attacks.
Write quality essay that incorporates critical thinking : PHI-105 Types of Communication Table. In order to write a quality persuasive essay that incorporates critical thinking, you must include a mixture of informative, explanatory, and persuasive statements because to persuade someone you must: Inform ..
How will you use the concepts in the class : Describe the concepts as if you were explaining them to a friend - How will you use the concepts in the class or in your personal or professional life?
Deficiencies in the four functions of management : Reviewing the information concerning GM's handing of a safety issue and recall included in the "GM Ignition Switch Recall." Write an essay (1,250 - 1,500 words) that addresses the following: 1. What deficiencies in the four functions of management..
Use encrypting file system to encrypt directories and files : Create a file called SecretFile.txt by typing copy con SecretFile.txt and pressing Enter. Note that you have not returned to the command prompt; you are still in the file-creating mode.
What are the ways that restrictions shaped american society : What are some of the ways that restrictions and beliefs based on race, ethnicity, gender, and national origin shaped American society in the latter half of the 1800s?
What processes would be the focus of your improvement effort : You want to improve the care delivery in the high-risk environments in your hospital, such as the operating room, intensive care unit, emergency department and chemotherapy unit. What processes would be the focus of your improvement efforts?
Discuss the biggest influence on a person gender : Based on the readings in the text and the supplemental article for this module, what factors do you believe have the biggest influence on a person's gender identity or sexual orientation
Analyze way aggregated data can show a different perspective : In a paper, present and analyze at least two ways aggregated data can show a different perspective on care of patients.Include at least two research sources in your paper and cite them in a References page at the end in APA format. As always, follo..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a scholarly paper at an appropriate standard

What object (people, places or things) does it suggest you need to study and what kind of study does the question suggest (empirical--e.g., ethnography, case study, descriptive study, experimental; historical--oral or archival or both; theoretical;..

  Find and sketch the magnitude response of this filter

In an impulse invariance design, show that if Hmc(s) is a transfer function of a stable system, the corresponding H(z) is also a transfer function of a stable system.

  Whose dns servers would you be trusting

Explain the insecurity in converting the source address to a name as above and then comparing this name to a given list of trusted hosts. Hint: Whose DNS servers would you be trusting?

  What will be its approximate speed in rpm

An AC inductor motor is rated at 1750 rpm with a line frequency of 60hz. If the motor is operated on a 50 hz line, what will be its approximate speed in rpm.

  Write an overview of configuring vcenter and vmware esxi

Write an overview of Configuring vCenter and VMware ESXi. Each overview should be between one half and one full page long. You should use a minimum of two sources for each overview.

  What would you recommend to meet your company needs

Your company wants to implement a strategy for backing up network data. It wants a strategy that allows it to back up changed files on a daily basis and recover lost files quickly in the event of disk failure. What would you recommend to meet your..

  Write a program to count the number of even elements

Write a program to count the number of even elements

  Should iso standards have been considered

Three months after the system changeover, you perform a post-implementation evaluation. Prepare three evaluation forms for the new information system: one for users, one for man· agers, and one for the IT operations staff.

  Cloud computing and develop a transition roadmap

Your organization has three data centers at three locations. The cost of ownership keeps rising. It has become a burden to the organization. The CEO has read that Cloud Computing is becoming the norm both in the private and public sectors. Your CE..

  Write a method is prime that determines

Write a method is prime that determines whether or not a number is prime. Prime numbers can only be evenly divided by 1 and themselves. For simplicity you can assume that 'n >= 2'.

  Would you leave all three predictors in this model

Does this model mean that by changing the levels of the predictors in this equation, we could affect life expectancy in that state? Explain

  Privacy and the fourth amendment

The United States legal system places the burden of proof on the prosecution. In other words, individuals are presumed innocent until proven guilty in a court of law. This burden of proof requires that law enforcement agencies do not violate a per..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd