Cybersecurity and Cyberwarfare: Virtual Box Set up and Vulnerability Management Framework
VerifiedAdded on 2023/04/23
|59
|946
|121
AI Summary
This document provides a step-by-step guide for Virtual Box Set up for Cybersecurity and Cyberwarfare. It also discusses a vulnerability management framework for ensuring the security of the project from attacks or threat vulnerabilities. The document includes subject matter such as Ubuntu Virtual Box Set up, Metasploitable 2 Virtual Box Set up, Kali Linux virtual box set up, blocking UDP packets, and cybersecurity strategy.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBERSECURITY AND CYBERWARFARE
Cybersecurity and Cyberwarfare
Name of the Student:
Name of the University:
Author Note
Cybersecurity and Cyberwarfare
Name of the Student:
Name of the University:
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
CYBERSECURITY AND CYBERWARFARE
Introduction
Task1
Virtual box download
1. The following address is used for downloading the virtual box:
https://www.virtualbox.org/wiki/Downloads
2.
3. The windows host has been selected as the task is being performed on the windows
platform.
Oracle Virtual Box Installation
CYBERSECURITY AND CYBERWARFARE
Introduction
Task1
Virtual box download
1. The following address is used for downloading the virtual box:
https://www.virtualbox.org/wiki/Downloads
2.
3. The windows host has been selected as the task is being performed on the windows
platform.
Oracle Virtual Box Installation
2
CYBERSECURITY AND CYBERWARFARE
1.
2.
CYBERSECURITY AND CYBERWARFARE
1.
2.
3
CYBERSECURITY AND CYBERWARFARE
3.
4.
CYBERSECURITY AND CYBERWARFARE
3.
4.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
CYBERSECURITY AND CYBERWARFARE
5.
6.
CYBERSECURITY AND CYBERWARFARE
5.
6.
5
CYBERSECURITY AND CYBERWARFARE
7.
Ubuntu Virtual Box Set up
Step 1. Downloading the Ubuntu iso file from the link provided below:
https://www.ubuntu.com/download/server
CYBERSECURITY AND CYBERWARFARE
7.
Ubuntu Virtual Box Set up
Step 1. Downloading the Ubuntu iso file from the link provided below:
https://www.ubuntu.com/download/server
6
CYBERSECURITY AND CYBERWARFARE
Step 2: Ubuntu installation
CYBERSECURITY AND CYBERWARFARE
Step 2: Ubuntu installation
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
CYBERSECURITY AND CYBERWARFARE
CYBERSECURITY AND CYBERWARFARE
8
CYBERSECURITY AND CYBERWARFARE
CYBERSECURITY AND CYBERWARFARE
9
CYBERSECURITY AND CYBERWARFARE
The Ubuntu set up is complete
Starting Ubuntu2
CYBERSECURITY AND CYBERWARFARE
The Ubuntu set up is complete
Starting Ubuntu2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
CYBERSECURITY AND CYBERWARFARE
1.
2.
CYBERSECURITY AND CYBERWARFARE
1.
2.
11
CYBERSECURITY AND CYBERWARFARE
3.
CYBERSECURITY AND CYBERWARFARE
3.
12
CYBERSECURITY AND CYBERWARFARE
4.
CYBERSECURITY AND CYBERWARFARE
4.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
CYBERSECURITY AND CYBERWARFARE
5.
CYBERSECURITY AND CYBERWARFARE
5.
14
CYBERSECURITY AND CYBERWARFARE
6.
CYBERSECURITY AND CYBERWARFARE
6.
15
CYBERSECURITY AND CYBERWARFARE
7.
CYBERSECURITY AND CYBERWARFARE
7.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16
CYBERSECURITY AND CYBERWARFARE
8.
CYBERSECURITY AND CYBERWARFARE
8.
17
CYBERSECURITY AND CYBERWARFARE
Metasploitable 2 Virtual Box Set up
The link provided below is used for downloading Metasploitable 2:
https://sourceforge.net/projects/metasploitable/files/
CYBERSECURITY AND CYBERWARFARE
Metasploitable 2 Virtual Box Set up
The link provided below is used for downloading Metasploitable 2:
https://sourceforge.net/projects/metasploitable/files/
18
CYBERSECURITY AND CYBERWARFARE
1.
2. Creating the machine on virtual box
3.
CYBERSECURITY AND CYBERWARFARE
1.
2. Creating the machine on virtual box
3.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19
CYBERSECURITY AND CYBERWARFARE
4.
5.
CYBERSECURITY AND CYBERWARFARE
4.
5.
20
CYBERSECURITY AND CYBERWARFARE
6.
CYBERSECURITY AND CYBERWARFARE
6.
21
CYBERSECURITY AND CYBERWARFARE
7.
8. Installation complete
Starting Metasploite2
CYBERSECURITY AND CYBERWARFARE
7.
8. Installation complete
Starting Metasploite2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
22
CYBERSECURITY AND CYBERWARFARE
1.
CYBERSECURITY AND CYBERWARFARE
1.
23
CYBERSECURITY AND CYBERWARFARE
Kali Linux virtual box set up
2. The kali linux virtual box set up is downloaded from the link provided below:
3. https://www.offensive-security.com/kali-linux-vm-vmware-
virtualbox-hyperv-image-download/
4.
5.
CYBERSECURITY AND CYBERWARFARE
Kali Linux virtual box set up
2. The kali linux virtual box set up is downloaded from the link provided below:
3. https://www.offensive-security.com/kali-linux-vm-vmware-
virtualbox-hyperv-image-download/
4.
5.
24
CYBERSECURITY AND CYBERWARFARE
6.
CYBERSECURITY AND CYBERWARFARE
6.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
25
CYBERSECURITY AND CYBERWARFARE
Starting Kali Linux
1.
CYBERSECURITY AND CYBERWARFARE
Starting Kali Linux
1.
26
CYBERSECURITY AND CYBERWARFARE
2.
CYBERSECURITY AND CYBERWARFARE
2.
27
CYBERSECURITY AND CYBERWARFARE
3.
Task 2
1. For the task both the metasploit and Armitage is used.
CYBERSECURITY AND CYBERWARFARE
3.
Task 2
1. For the task both the metasploit and Armitage is used.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
28
CYBERSECURITY AND CYBERWARFARE
2.
3.
CYBERSECURITY AND CYBERWARFARE
2.
3.
29
CYBERSECURITY AND CYBERWARFARE
4.
CYBERSECURITY AND CYBERWARFARE
4.
30
CYBERSECURITY AND CYBERWARFARE
5.
CYBERSECURITY AND CYBERWARFARE
5.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
31
CYBERSECURITY AND CYBERWARFARE
6.
CYBERSECURITY AND CYBERWARFARE
6.
32
CYBERSECURITY AND CYBERWARFARE
7.
CYBERSECURITY AND CYBERWARFARE
7.
33
CYBERSECURITY AND CYBERWARFARE
8.
CYBERSECURITY AND CYBERWARFARE
8.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
34
CYBERSECURITY AND CYBERWARFARE
9.
CYBERSECURITY AND CYBERWARFARE
9.
35
CYBERSECURITY AND CYBERWARFARE
10.
CYBERSECURITY AND CYBERWARFARE
10.
36
CYBERSECURITY AND CYBERWARFARE
11.
CYBERSECURITY AND CYBERWARFARE
11.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
37
CYBERSECURITY AND CYBERWARFARE
12.
CYBERSECURITY AND CYBERWARFARE
12.
38
CYBERSECURITY AND CYBERWARFARE
13.
CYBERSECURITY AND CYBERWARFARE
13.
39
CYBERSECURITY AND CYBERWARFARE
14.
CYBERSECURITY AND CYBERWARFARE
14.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
40
CYBERSECURITY AND CYBERWARFARE
15.
CYBERSECURITY AND CYBERWARFARE
15.
41
CYBERSECURITY AND CYBERWARFARE
16.
CYBERSECURITY AND CYBERWARFARE
16.
42
CYBERSECURITY AND CYBERWARFARE
17.
CYBERSECURITY AND CYBERWARFARE
17.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
43
CYBERSECURITY AND CYBERWARFARE
18.
19. No exploitable targets were found. However a possible vulnerability was found.
CYBERSECURITY AND CYBERWARFARE
18.
19. No exploitable targets were found. However a possible vulnerability was found.
44
CYBERSECURITY AND CYBERWARFARE
20.
Task 3
1. Using sudo apt-get update
CYBERSECURITY AND CYBERWARFARE
20.
Task 3
1. Using sudo apt-get update
45
CYBERSECURITY AND CYBERWARFARE
2.
3. Sudo apt-get install wget
CYBERSECURITY AND CYBERWARFARE
2.
3. Sudo apt-get install wget
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
46
CYBERSECURITY AND CYBERWARFARE
4.
5. wget http://la-samhna.de/samhain/samhain-current.tar.gz
CYBERSECURITY AND CYBERWARFARE
4.
5. wget http://la-samhna.de/samhain/samhain-current.tar.gz
47
CYBERSECURITY AND CYBERWARFARE
6.
7. tar –xzf Samhain-current.tar.gz
CYBERSECURITY AND CYBERWARFARE
6.
7. tar –xzf Samhain-current.tar.gz
48
CYBERSECURITY AND CYBERWARFARE
8.
9. tar –xzf Samhain-4.3.2.tar.gz
CYBERSECURITY AND CYBERWARFARE
8.
9. tar –xzf Samhain-4.3.2.tar.gz
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
49
CYBERSECURITY AND CYBERWARFARE
10.
11. cd samhain-4.3.2
CYBERSECURITY AND CYBERWARFARE
10.
11. cd samhain-4.3.2
50
CYBERSECURITY AND CYBERWARFARE
12.
Task 4
Blocking UDP packets
CYBERSECURITY AND CYBERWARFARE
12.
Task 4
Blocking UDP packets
51
CYBERSECURITY AND CYBERWARFARE
CYBERSECURITY AND CYBERWARFARE
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
52
CYBERSECURITY AND CYBERWARFARE
CYBERSECURITY AND CYBERWARFARE
53
CYBERSECURITY AND CYBERWARFARE
CYBERSECURITY AND CYBERWARFARE
54
CYBERSECURITY AND CYBERWARFARE
CYBERSECURITY AND CYBERWARFARE
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
55
CYBERSECURITY AND CYBERWARFARE
CYBERSECURITY AND CYBERWARFARE
56
CYBERSECURITY AND CYBERWARFARE
Task 5
Cybersecurity strategy
A standard security control framework need to be designed for ensuring the security
of the project from the attacks or threat vulnerabilities. In order to do that, the following
vulnerability management framework will be utilized. In the diagram attached below, the
details of the strategy that will be used for the vurnebality has been provided. There will be
main four stages of the secuirity framework. The stages are: Identify, Analyze, validate and
Action.
Identify: This is the first stage of the framework, where the security threats will be
identified. There are three sub activities under this step. Those are: identification of the
threats through the use of cyber threat intelligence, Assessment of the vulnerability and the
management of the security events.
Analyze: The identified security threats and the security incidents will be analyzed in
this stage. In this stage, the potentialities of the threats will be analyzed for understanding the
impact of the individual threats over the project.
CYBERSECURITY AND CYBERWARFARE
Task 5
Cybersecurity strategy
A standard security control framework need to be designed for ensuring the security
of the project from the attacks or threat vulnerabilities. In order to do that, the following
vulnerability management framework will be utilized. In the diagram attached below, the
details of the strategy that will be used for the vurnebality has been provided. There will be
main four stages of the secuirity framework. The stages are: Identify, Analyze, validate and
Action.
Identify: This is the first stage of the framework, where the security threats will be
identified. There are three sub activities under this step. Those are: identification of the
threats through the use of cyber threat intelligence, Assessment of the vulnerability and the
management of the security events.
Analyze: The identified security threats and the security incidents will be analyzed in
this stage. In this stage, the potentialities of the threats will be analyzed for understanding the
impact of the individual threats over the project.
57
CYBERSECURITY AND CYBERWARFARE
Action: In this stage, the actions will be taken for mitigating the threats based on the
analysis done on the previous stage. Before entering to this stage, the threats or risks will be
prioritized after the analysis done. All the threats will not be totally removable. In such kind
of cases, proper measures need to be taken for ensuring the minimum impact of the threats
over the project. Asset management, security patch management and the security
configuration management are the main activities or actions that need to be done in this stage.
Validate: After the actions are considered, these need to be validate to understand
whether the actions were appropriate for the situation or not. Actually, the strength and
impact of the asset management, security management will be validated in this stage.
Theor
etical
Threat
s
Securi
ty
Incide
ntIdenti
fied
Threat
s
Compliance and Audit
Cyber Threat
Intelligence
Vulnerability
Assessment
Security Event
Management
Threat
Management
Security Incident
Response Management
Asset
Management
Security Patch
Management
Security Configuration
Management
Selecting
action and
setting
Priority
Identify
Action
AnalyseValidate
Vulnerabi
lity
Manage
ment
CYBERSECURITY AND CYBERWARFARE
Action: In this stage, the actions will be taken for mitigating the threats based on the
analysis done on the previous stage. Before entering to this stage, the threats or risks will be
prioritized after the analysis done. All the threats will not be totally removable. In such kind
of cases, proper measures need to be taken for ensuring the minimum impact of the threats
over the project. Asset management, security patch management and the security
configuration management are the main activities or actions that need to be done in this stage.
Validate: After the actions are considered, these need to be validate to understand
whether the actions were appropriate for the situation or not. Actually, the strength and
impact of the asset management, security management will be validated in this stage.
Theor
etical
Threat
s
Securi
ty
Incide
ntIdenti
fied
Threat
s
Compliance and Audit
Cyber Threat
Intelligence
Vulnerability
Assessment
Security Event
Management
Threat
Management
Security Incident
Response Management
Asset
Management
Security Patch
Management
Security Configuration
Management
Selecting
action and
setting
Priority
Identify
Action
AnalyseValidate
Vulnerabi
lity
Manage
ment
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
58
CYBERSECURITY AND CYBERWARFARE
Figure: Cybersecurity Strategy Framework
(Source: Created by author)
CYBERSECURITY AND CYBERWARFARE
Figure: Cybersecurity Strategy Framework
(Source: Created by author)
1 out of 59
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.