logo

Computer Security - Assignment

   

Added on  2021-06-17

25 Pages4292 Words26 Views

Contents
1. Introduction............................................................................................................ 2
2. Security Investigation............................................................................................... 3
3. Tools and Techniques............................................................................................... 8
4. Results obtained..................................................................................................... 14
5. Steps to Secure the System....................................................................................... 19
6. Security Issues found in the designed system...............................................................15
7. Conclusion............................................................................................................ 22
8. References............................................................................................................ 23
1

1. Introduction
This project is going to evaluate the security of the system which is provided by the WidgetsInc.
The Benny VandergastInc provided the VMware virtual machine for testing the security of the
software. The evaluation process of security of the system will be performed on the virtual
machine image which was given. In this project, various types of tools and techniques will be
used to investigate the security of the system. After investigating the security of the system, the
security issues encountered in the given system will be removed and explained. The
resultobtained from the investigation of the security of the system will be explained. Then, how
to enhance the system security and its efficiency will be proposed.
2

2. Security Investigation
Security investigation is needed to ensure the authorization, privacy, authenticity, and
integrity of the system. Authorization means the only authorized person should access the
system. Privacy means the private information should be secured in a correct manner(nixCraft,
2018). Authenticity means verifying the intended users. Integrity means giving assurance of the
data. This security investigation helps to find whether the system is hacked or not. By
investigating the security of the system, user can find the problems encountered in their
systems(Linux Hint, 2018). It leads the user to resolve the problems in appropriate way. It will
enhance the security and efficiency of the system.
For investigating the security of WidgetsInc system, Ubuntu with linux 3.11.0-15-generic
software is used. This is shown in below screenshot.
After starting the ubuntu with Linux software in VMware Workstation Player, the system will
ask for the login to it. For login purpose, the username is given as root. Because root is
commonly used as a username in Linux system. Then the password given to the system is
WidgetsInc. By giving this username and password, the system will log in.
3

The below screenshot shows the system is logged in.
The command ‘pwd’ is used to know about the current directory of the system and ‘who’
command is used to check the person who logged into the system. Then ‘df’ command is used to
know about the available and used disk space of the file system.
4

Minimize Software to Minimize Vulnerability
To minimize the vulnerabilities and number of software usages, ‘yum’ command is used. At
first, ‘yum’ command is not installed. So it shows the below screenshot.
Then by giving ‘apt-get install yum’ command, the yum is installed in the Linux which is shown
in below screenshot.
After giving this yum command, it shows all the software packages in the system. Delete the
unwanted packages in it. The completion of displaying packages is shown below.
5

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security-System Investigation
|12
|1368
|37

Investigation Procedure for Computer Security and Proposal to Secure the System
|17
|3681
|185

Computer Security System Investigation
|18
|2613
|81

Installing Enterprise-wide Operating System on Virtual Box
|19
|1451
|383

Computer Security System Investigation
|20
|2886
|78

Computer Security Project
|21
|3764
|57