Cybersecurity and Cyberwarfare: Virtual Box Set up and Vulnerability Management Framework

Verified

Added on  2023/04/23

|59
|946
|121
AI Summary
This document provides a step-by-step guide for Virtual Box Set up for Cybersecurity and Cyberwarfare. It also discusses a vulnerability management framework for ensuring the security of the project from attacks or threat vulnerabilities. The document includes subject matter such as Ubuntu Virtual Box Set up, Metasploitable 2 Virtual Box Set up, Kali Linux virtual box set up, blocking UDP packets, and cybersecurity strategy.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBERSECURITY AND CYBERWARFARE
Cybersecurity and Cyberwarfare
Name of the Student:
Name of the University:
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
CYBERSECURITY AND CYBERWARFARE
Introduction
Task1
Virtual box download
1. The following address is used for downloading the virtual box:
https://www.virtualbox.org/wiki/Downloads
2.
3. The windows host has been selected as the task is being performed on the windows
platform.
Oracle Virtual Box Installation
Document Page
2
CYBERSECURITY AND CYBERWARFARE
1.
2.
Document Page
3
CYBERSECURITY AND CYBERWARFARE
3.
4.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
CYBERSECURITY AND CYBERWARFARE
5.
6.
Document Page
5
CYBERSECURITY AND CYBERWARFARE
7.
Ubuntu Virtual Box Set up
Step 1. Downloading the Ubuntu iso file from the link provided below:
https://www.ubuntu.com/download/server
Document Page
6
CYBERSECURITY AND CYBERWARFARE
Step 2: Ubuntu installation
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
CYBERSECURITY AND CYBERWARFARE
Document Page
8
CYBERSECURITY AND CYBERWARFARE
Document Page
9
CYBERSECURITY AND CYBERWARFARE
The Ubuntu set up is complete
Starting Ubuntu2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
CYBERSECURITY AND CYBERWARFARE
1.
2.
Document Page
11
CYBERSECURITY AND CYBERWARFARE
3.
Document Page
12
CYBERSECURITY AND CYBERWARFARE
4.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
CYBERSECURITY AND CYBERWARFARE
5.
Document Page
14
CYBERSECURITY AND CYBERWARFARE
6.
Document Page
15
CYBERSECURITY AND CYBERWARFARE
7.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
CYBERSECURITY AND CYBERWARFARE
8.
Document Page
17
CYBERSECURITY AND CYBERWARFARE
Metasploitable 2 Virtual Box Set up
The link provided below is used for downloading Metasploitable 2:
https://sourceforge.net/projects/metasploitable/files/
Document Page
18
CYBERSECURITY AND CYBERWARFARE
1.
2. Creating the machine on virtual box
3.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19
CYBERSECURITY AND CYBERWARFARE
4.
5.
Document Page
20
CYBERSECURITY AND CYBERWARFARE
6.
Document Page
21
CYBERSECURITY AND CYBERWARFARE
7.
8. Installation complete
Starting Metasploite2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22
CYBERSECURITY AND CYBERWARFARE
1.
Document Page
23
CYBERSECURITY AND CYBERWARFARE
Kali Linux virtual box set up
2. The kali linux virtual box set up is downloaded from the link provided below:
3. https://www.offensive-security.com/kali-linux-vm-vmware-
virtualbox-hyperv-image-download/
4.
5.
Document Page
24
CYBERSECURITY AND CYBERWARFARE
6.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
25
CYBERSECURITY AND CYBERWARFARE
Starting Kali Linux
1.
Document Page
26
CYBERSECURITY AND CYBERWARFARE
2.
Document Page
27
CYBERSECURITY AND CYBERWARFARE
3.
Task 2
1. For the task both the metasploit and Armitage is used.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
28
CYBERSECURITY AND CYBERWARFARE
2.
3.
Document Page
29
CYBERSECURITY AND CYBERWARFARE
4.
Document Page
30
CYBERSECURITY AND CYBERWARFARE
5.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
31
CYBERSECURITY AND CYBERWARFARE
6.
Document Page
32
CYBERSECURITY AND CYBERWARFARE
7.
Document Page
33
CYBERSECURITY AND CYBERWARFARE
8.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
34
CYBERSECURITY AND CYBERWARFARE
9.
Document Page
35
CYBERSECURITY AND CYBERWARFARE
10.
Document Page
36
CYBERSECURITY AND CYBERWARFARE
11.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
37
CYBERSECURITY AND CYBERWARFARE
12.
Document Page
38
CYBERSECURITY AND CYBERWARFARE
13.
Document Page
39
CYBERSECURITY AND CYBERWARFARE
14.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
40
CYBERSECURITY AND CYBERWARFARE
15.
Document Page
41
CYBERSECURITY AND CYBERWARFARE
16.
Document Page
42
CYBERSECURITY AND CYBERWARFARE
17.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
43
CYBERSECURITY AND CYBERWARFARE
18.
19. No exploitable targets were found. However a possible vulnerability was found.
Document Page
44
CYBERSECURITY AND CYBERWARFARE
20.
Task 3
1. Using sudo apt-get update
Document Page
45
CYBERSECURITY AND CYBERWARFARE
2.
3. Sudo apt-get install wget
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
46
CYBERSECURITY AND CYBERWARFARE
4.
5. wget http://la-samhna.de/samhain/samhain-current.tar.gz
Document Page
47
CYBERSECURITY AND CYBERWARFARE
6.
7. tar –xzf Samhain-current.tar.gz
Document Page
48
CYBERSECURITY AND CYBERWARFARE
8.
9. tar –xzf Samhain-4.3.2.tar.gz
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
49
CYBERSECURITY AND CYBERWARFARE
10.
11. cd samhain-4.3.2
Document Page
50
CYBERSECURITY AND CYBERWARFARE
12.
Task 4
Blocking UDP packets
Document Page
51
CYBERSECURITY AND CYBERWARFARE
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
52
CYBERSECURITY AND CYBERWARFARE
Document Page
53
CYBERSECURITY AND CYBERWARFARE
Document Page
54
CYBERSECURITY AND CYBERWARFARE
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
55
CYBERSECURITY AND CYBERWARFARE
Document Page
56
CYBERSECURITY AND CYBERWARFARE
Task 5
Cybersecurity strategy
A standard security control framework need to be designed for ensuring the security
of the project from the attacks or threat vulnerabilities. In order to do that, the following
vulnerability management framework will be utilized. In the diagram attached below, the
details of the strategy that will be used for the vurnebality has been provided. There will be
main four stages of the secuirity framework. The stages are: Identify, Analyze, validate and
Action.
Identify: This is the first stage of the framework, where the security threats will be
identified. There are three sub activities under this step. Those are: identification of the
threats through the use of cyber threat intelligence, Assessment of the vulnerability and the
management of the security events.
Analyze: The identified security threats and the security incidents will be analyzed in
this stage. In this stage, the potentialities of the threats will be analyzed for understanding the
impact of the individual threats over the project.
Document Page
57
CYBERSECURITY AND CYBERWARFARE
Action: In this stage, the actions will be taken for mitigating the threats based on the
analysis done on the previous stage. Before entering to this stage, the threats or risks will be
prioritized after the analysis done. All the threats will not be totally removable. In such kind
of cases, proper measures need to be taken for ensuring the minimum impact of the threats
over the project. Asset management, security patch management and the security
configuration management are the main activities or actions that need to be done in this stage.
Validate: After the actions are considered, these need to be validate to understand
whether the actions were appropriate for the situation or not. Actually, the strength and
impact of the asset management, security management will be validated in this stage.
Theor
etical
Threat
s
Securi
ty
Incide
ntIdenti
fied
Threat
s
Compliance and Audit
Cyber Threat
Intelligence
Vulnerability
Assessment
Security Event
Management
Threat
Management
Security Incident
Response Management
Asset
Management
Security Patch
Management
Security Configuration
Management
Selecting
action and
setting
Priority
Identify
Action
AnalyseValidate
Vulnerabi
lity
Manage
ment
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
58
CYBERSECURITY AND CYBERWARFARE
Figure: Cybersecurity Strategy Framework
(Source: Created by author)
chevron_up_icon
1 out of 59
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]