logo

Information System Threats Attacks and Defences

   

Added on  2022-09-09

35 Pages2571 Words18 Views
Running head: Information System Threats, Attacks and Defences
Information System Threats, Attacks and Defences
Name of the Student
Name of the University
Author Note
Information System    Threats Attacks and Defences_1
Information System Threats, Attacks and Defences 1
Table of Contents
Introduction:...............................................................................................................................2
Procedure:..................................................................................................................................2
Discussion:...............................................................................................................................32
Conclusion:..............................................................................................................................33
Bibliography:............................................................................................................................34
Information System    Threats Attacks and Defences_2
Information System Threats, Attacks and Defences 2
Introduction:
The purpose of this paper is discuss about the establishing connection between kali
Linux and windows operating system. For doing the Lab procedure I have chosen oracle
virtual box. It is a free and open source hosted hyper visor for the x86 visualization. The tool
is developed by Oracle Corporation. It supports management and creation of guest virtual
machines such as Windows, Linux, BSD, OS/2, Solaris, Haiku, and OSx86. For the task I
will create 2 vms in virtual box. One is kali Linux and the other one is windows. Both the
system will be installed as host only network.
Procedure:
Question 1:
Downloading VMware virtual machine for windows from:
https://www.oracle.com/virtualization/technologies/vm/downloads/virtualbox-
downloads.html
File downloaded:
Installing virtual box:
Information System    Threats Attacks and Defences_3
Information System Threats, Attacks and Defences 3
Information System    Threats Attacks and Defences_4
Information System Threats, Attacks and Defences 4
Information System    Threats Attacks and Defences_5
Information System Threats, Attacks and Defences 5
Installation complete:
Information System    Threats Attacks and Defences_6
Information System Threats, Attacks and Defences 6
Question 2:
Downloading kali Linux from https://www.kali.org/downloads/
Information System    Threats Attacks and Defences_7
Information System Threats, Attacks and Defences 7
64 bit kali iso downloaded:
Question 3:
Creating kali vm in virtual box:
Information System    Threats Attacks and Defences_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
INFORMATION SYSTEM THREATS, ATTACKS AND DEFENSES.
|29
|1680
|33

Assignment | Cyber Security
|23
|2174
|14