Use encrypting file system to encrypt directories and files

Assignment Help Basic Computer Science
Reference no: EM131413474

Hands-On Project 5-3: Using the Cipher Command

Objective: Use the Encrypting File System to encrypt directories and files.

Description: In this project, you use the cipher command to investigate the functions of the Encrypting File System (EFS) in Windows 7 or Windows Server 2008. EFS requires that users have an EFS digital certificate for encrypting and decrypting files and directories. Users who do not have an EFS certificate have one created automatically the first time they encrypt a file. Users can choose from certificates to allow other users to access encrypted files.

1. Log on either to the Windows Server 2008 or Windows 7 computer as the Teamx administrator.

2. Open a command prompt, type cd \ and press Enter.

3. Create a directory called Private by typing mkdir Private and pressing Enter. Type cd Private and press Enter to change to the Private directory.

4. Create a file called SecretFile.txt by typing copy con SecretFile.txt and pressing Enter. Note that you have not returned to the command prompt; you are still in the file-creating mode.

5. Type This is a secret file. Press Enter, press Ctrl+Z, and then press Enter to end the file. Type dir and press Enter to verify that the file exists. Type type SecretFile.txt to verify the contents of the file.

6. Type cd .. and press Enter to return to the parent directory (C:\). Type cipher and press Enter to display the encryption status for the contents of C:\. Notice that no files or directories are encrypted, as indicated by the "U" (for "unencrypted") that precedes each listing.

7. Type cipher /? and press Enter to see the cipher command help file.

8. Type cipher /E Private and press Enter to encrypt the Private directory. Type cipher and press Enter to verify that the Private directory has been encrypted.

9. Type type \Private\SecretFile.txt to verify that you can still access the file.

10. Create a new file in the Private directory named SecretFile2.txt. Type copy con C:\Private\SecretFile2.txt and press Enter. Type This is also a secret file. Press Enter, press Ctrl+Z, and then press Enter to end the file. Verify that the SecretFile2.txt file exists and that its content is "This is also a secret file."

11. Type cd Private and press Enter. Type cipher and press Enter to see the encryption status of the two files.

12. On the Windows Server 2008 computer, create a domain user named Shifty Smith with a logon name of ssmith and a password of Pa$word. Log off either computer, and then log on as Shifty Smith. 13. Open a command prompt, and change to the C:\Private directory. Enter the type command in an attempt to display the contents of SecretFile.txt and SecretFile2.txt. You should be denied access to SecretFile2.txt.

14. Log out and then log on as the Teamx administrator. Open a command prompt, and change to the C:\Private directory.

15. Type cipher /C and press Enter to see details about the encrypted file, including which users can decrypt the file.

16. Click Start, click Computer, double-click Local Disk (C:), and double-click Private. (Note that Private is shown in green to indicate that it is encrypted.) Right-click SecretFile2.txt, click Properties, click Advanced, click Details, and click Add. Note that Shifty Smith does not have an EFS digital certificate to select, which means that you cannot give Shifty the ability to see the encrypted file.

17. Log off and then log on as Shifty Smith. Right-click the desktop, click New, click Text Document, and name the document Shifty. Right-click the document, click Properties, click Advanced, check the Encrypt contents to secure data box, and click OK. Click OK again. In the Encryption Warning window, click the Encrypt the file only option button, and click OK. Log out.

18. Log on as the Teamx administrator. Repeat Step 16; this time you should see Shifty's EFS certificate. Select it and then click OK four times. Log out.

19. Log on as Shifty Smith, and repeat Step 13. This time you should have access to SecretFile2.txt. Type cipher /C and press Enter. Note that Shifty now is listed as having the ability to decrypt SecretFile2.txt.

20. Close all windows and log out of both systems.

Reference no: EM131413474

Questions Cloud

How the dnssec system can help to prevent these attacks : You have been asked to prepare a two-page report that explains how DNS cache poisoning attacks work and how the DNSSEC system can help to prevent these attacks.
Write quality essay that incorporates critical thinking : PHI-105 Types of Communication Table. In order to write a quality persuasive essay that incorporates critical thinking, you must include a mixture of informative, explanatory, and persuasive statements because to persuade someone you must: Inform ..
How will you use the concepts in the class : Describe the concepts as if you were explaining them to a friend - How will you use the concepts in the class or in your personal or professional life?
Deficiencies in the four functions of management : Reviewing the information concerning GM's handing of a safety issue and recall included in the "GM Ignition Switch Recall." Write an essay (1,250 - 1,500 words) that addresses the following: 1. What deficiencies in the four functions of management..
Use encrypting file system to encrypt directories and files : Create a file called SecretFile.txt by typing copy con SecretFile.txt and pressing Enter. Note that you have not returned to the command prompt; you are still in the file-creating mode.
What are the ways that restrictions shaped american society : What are some of the ways that restrictions and beliefs based on race, ethnicity, gender, and national origin shaped American society in the latter half of the 1800s?
What processes would be the focus of your improvement effort : You want to improve the care delivery in the high-risk environments in your hospital, such as the operating room, intensive care unit, emergency department and chemotherapy unit. What processes would be the focus of your improvement efforts?
Discuss the biggest influence on a person gender : Based on the readings in the text and the supplemental article for this module, what factors do you believe have the biggest influence on a person's gender identity or sexual orientation
Analyze way aggregated data can show a different perspective : In a paper, present and analyze at least two ways aggregated data can show a different perspective on care of patients.Include at least two research sources in your paper and cite them in a References page at the end in APA format. As always, follo..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd