logo

Computer Security System Investigation

   

Added on  2022-12-15

18 Pages3850 Words114 Views
University
Semester
COMPUTER SECURITY-SYSTEM
INVESTIGATION
Student ID
Student Name
Submission Date
1

Table of Contents
1. Project Goal........................................................................................................ 3
2. Virtual Machine (VM) Image File Installation Procedure.................................................3
3. Inspection of the Security System.............................................................................. 7
4. Inspection Report and Details of the Security System...................................................15
5. Additional Security System Suggestions...................................................................17
References.............................................................................................................. 20
2

Project Goal
Hacking! Security! Safety! Threat! Malware! These are few words that every user and
every operator is scared of. In today’s world of High end Systems and tons of Data/
Information movie around, it becomes apparent to all that Security is a prime concern. Our
project addresses this major issue and tries tis best to solve it. Our project will study, analyze
and understand the problems related to Security and Threats to a System. Our main
participant in this project is a Virtual Machine (VM). A VM is an operating system (OS) or
application environment that is installed on software, which imitates dedicated hardware and
gives the end user, the same experience on a virtual machine as they would have on a
dedicated hardware. VM image is provided by a computer Firm, “Widgets Inc” to another
firm called “Benny Vandergast Inc” for testing out as same will be used in their new web
based store. By using VMware, Benny Vandergast will use them on the VM’s and ask the
users to evaluate it Security Features. So, in this project, those users are we. Here is where,
we start our work on this Project from. We shall understand the whole Security status of the
VM images provided by Benny Vandergast, inspect them, run tests on them, analyze , locate
the weak security areas and finally prepare a thorough report on all the findings and short
comings. We shall be using Special Security Tools (Iron Wasp, Grabber, etc) to
understand and study this project and the security concerns related to it. We shall be testing
the “Virtual Machine Image” files for security threats and attacks and these shall be based on
the following criteria,
Process and Plan for Inspection of the security system.
Various Tools/ Methods to be used for the security system investigation.
Result and Outcome once the investigation is completed.
Analyzing possible outside threats and safe guarding against them.
Additional measures related to security problems.
Thus, now we shall explain and understand all the above points and how it will be
used in our Project related to the Security of VM image files and associated system.
Task 2 - Virtual Machine (VM) Image File Installation Procedure
We shall now install the “Virtual Machine work station” on our system (Ali, 2014).
3

Select the Portal where the VM file has to be downloaded
When the process of downloading has been completed, after that install the VM work
station.
Once the installation of VM workstation is over, the default screen will be displayed
on the “Work Station 14 Pro” platform. This can be seen in the below image,
Next step is to click on the center icon and open the Virtual Machine (VM) image file as
shown in the below image (digitalocean.com, 2019),
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security System Investigation
|17
|3418
|329

Computer Security System Investigation
|22
|4632
|22

Computer Security-System Investigation
|17
|3097
|33

Computer Security System Investigation
|20
|4395
|42

Computer Security-System Investigation
|20
|3814
|21

System Security Investigation for Virtual Machine Image File
|27
|4008
|26