logo

Computer Security-System Investigation

   

Added on  2022-12-19

20 Pages3814 Words21 Views
University
Semester
COMPUTER SECURITY-SYSTEM
INVESTIGATION
Student ID
Student Name
Submission Date
1

Table of Contents
Task – 1 VM ware Image File Installation.........................................................................3
Task – 2 Description of Investigation of the System Security................................................10
Description of the Results............................................................................................ 14
Proposal on how to secure the System............................................................................18
References.............................................................................................................. 20
2

Task – 1 VM ware Image File Installation
In this project we shall analyze the security aspects and security arrangements for a
Virtual Machine (VM). Now VM are basically Software, an operating system (OS) or an
application environment that is installed on software and which mimics an actual hardware
operation. It gives the same feeling as working on a real hardware. A Firm known as “Benny
Vandergast Inc” will provide us with Virtual Machine files , which was given to them by
another firm “Widgets Inc” (They distributes computer components , Disks, Hardware,
Software, equipment etc.) They want us to assess the Security of these Virtual Machine Files,
which shall be used on the new e-commerce store of Widget Inc.
A “Vulnerability Assessment” for the System Security will be a process for defining,
identifying, classifying and prioritizing vulnerabilities in the computer system, applications
and network infrastructure and providing the organization after the assessment with the
necessary knowledge, awareness and risk background to understand the Potential threats to
its environment and react appropriately.
So our this Project aims is to Assess the Security System of the VM image files, find
out the vulnerabilities , identify the threat areas and eradicate all the security loop holes so
that the System is fully safe and secured from any attacks, whether it be internal or external.
For this process, we shall be using special security methods and tools on the framework to
give full justice to the assessment procedure of our Project. Now, the factors to be taken into
consideration during the whole process will include the following,
a. Identify the System which has to be evaluated.
b. Understand the Method to be adopted for the Assessment.
c. List out the System’s vulnerabilities.
d. Choose the best Tool to overcome the threats.
e. Apply this Tool to overcome the threats.
f. Minimize all the Threats and if possible completely remove them.
We shall start the project by first
To do virtual machine image file installing the Virtual Machine Image file as provided by the
Firm. This will involve the following steps,
- On our Portal, download the VM file (Virtual Machine image File).
- Once the download has been completed, install the VM ware workstation (VMware is
a virtualization and cloud computing software)
3

- As shown in the below picture, open the installed VM ware workstation.
-
Next, click the “Open a Virtual Machine” on the Workstation 14 Pro software, as shown in
the picture,
This will then take us to the folder where all the VM image files are located at. Select our
VM image file and click “Open” on that particular VM file, as shown in the below picture,
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security System Investigation
|22
|4632
|22

Computer Security System Investigation
|17
|3418
|329

Computer Security System Investigation
|25
|3821
|87

Computer Security System Investigation
|20
|2886
|78

Computer Security System Investigation
|18
|3850
|114

Computer Security Project
|16
|3465
|79