Computer Security-System Investigation
Added on 2022-12-19
20 Pages3814 Words21 Views
University
Semester
COMPUTER SECURITY-SYSTEM
INVESTIGATION
Student ID
Student Name
Submission Date
1
Semester
COMPUTER SECURITY-SYSTEM
INVESTIGATION
Student ID
Student Name
Submission Date
1
Table of Contents
Task – 1 VM ware Image File Installation.........................................................................3
Task – 2 Description of Investigation of the System Security................................................10
Description of the Results............................................................................................ 14
Proposal on how to secure the System............................................................................18
References.............................................................................................................. 20
2
Task – 1 VM ware Image File Installation.........................................................................3
Task – 2 Description of Investigation of the System Security................................................10
Description of the Results............................................................................................ 14
Proposal on how to secure the System............................................................................18
References.............................................................................................................. 20
2
Task – 1 VM ware Image File Installation
In this project we shall analyze the security aspects and security arrangements for a
Virtual Machine (VM). Now VM are basically Software, an operating system (OS) or an
application environment that is installed on software and which mimics an actual hardware
operation. It gives the same feeling as working on a real hardware. A Firm known as “Benny
Vandergast Inc” will provide us with Virtual Machine files , which was given to them by
another firm “Widgets Inc” (They distributes computer components , Disks, Hardware,
Software, equipment etc.) They want us to assess the Security of these Virtual Machine Files,
which shall be used on the new e-commerce store of Widget Inc.
A “Vulnerability Assessment” for the System Security will be a process for defining,
identifying, classifying and prioritizing vulnerabilities in the computer system, applications
and network infrastructure and providing the organization after the assessment with the
necessary knowledge, awareness and risk background to understand the Potential threats to
its environment and react appropriately.
So our this Project aims is to Assess the Security System of the VM image files, find
out the vulnerabilities , identify the threat areas and eradicate all the security loop holes so
that the System is fully safe and secured from any attacks, whether it be internal or external.
For this process, we shall be using special security methods and tools on the framework to
give full justice to the assessment procedure of our Project. Now, the factors to be taken into
consideration during the whole process will include the following,
a. Identify the System which has to be evaluated.
b. Understand the Method to be adopted for the Assessment.
c. List out the System’s vulnerabilities.
d. Choose the best Tool to overcome the threats.
e. Apply this Tool to overcome the threats.
f. Minimize all the Threats and if possible completely remove them.
We shall start the project by first
To do virtual machine image file installing the Virtual Machine Image file as provided by the
Firm. This will involve the following steps,
- On our Portal, download the VM file (Virtual Machine image File).
- Once the download has been completed, install the VM ware workstation (VMware is
a virtualization and cloud computing software)
3
In this project we shall analyze the security aspects and security arrangements for a
Virtual Machine (VM). Now VM are basically Software, an operating system (OS) or an
application environment that is installed on software and which mimics an actual hardware
operation. It gives the same feeling as working on a real hardware. A Firm known as “Benny
Vandergast Inc” will provide us with Virtual Machine files , which was given to them by
another firm “Widgets Inc” (They distributes computer components , Disks, Hardware,
Software, equipment etc.) They want us to assess the Security of these Virtual Machine Files,
which shall be used on the new e-commerce store of Widget Inc.
A “Vulnerability Assessment” for the System Security will be a process for defining,
identifying, classifying and prioritizing vulnerabilities in the computer system, applications
and network infrastructure and providing the organization after the assessment with the
necessary knowledge, awareness and risk background to understand the Potential threats to
its environment and react appropriately.
So our this Project aims is to Assess the Security System of the VM image files, find
out the vulnerabilities , identify the threat areas and eradicate all the security loop holes so
that the System is fully safe and secured from any attacks, whether it be internal or external.
For this process, we shall be using special security methods and tools on the framework to
give full justice to the assessment procedure of our Project. Now, the factors to be taken into
consideration during the whole process will include the following,
a. Identify the System which has to be evaluated.
b. Understand the Method to be adopted for the Assessment.
c. List out the System’s vulnerabilities.
d. Choose the best Tool to overcome the threats.
e. Apply this Tool to overcome the threats.
f. Minimize all the Threats and if possible completely remove them.
We shall start the project by first
To do virtual machine image file installing the Virtual Machine Image file as provided by the
Firm. This will involve the following steps,
- On our Portal, download the VM file (Virtual Machine image File).
- Once the download has been completed, install the VM ware workstation (VMware is
a virtualization and cloud computing software)
3
- As shown in the below picture, open the installed VM ware workstation.
-
Next, click the “Open a Virtual Machine” on the Workstation 14 Pro software, as shown in
the picture,
This will then take us to the folder where all the VM image files are located at. Select our
VM image file and click “Open” on that particular VM file, as shown in the below picture,
4
-
Next, click the “Open a Virtual Machine” on the Workstation 14 Pro software, as shown in
the picture,
This will then take us to the folder where all the VM image files are located at. Select our
VM image file and click “Open” on that particular VM file, as shown in the below picture,
4
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Computer Security System Investigationlg...
|22
|4632
|22
Computer Security System Investigationlg...
|17
|3418
|329
Computer Security System Investigationlg...
|25
|3821
|87
Computer Security System Investigationlg...
|20
|2886
|78
Computer Security System Investigationlg...
|18
|3850
|114
Computer Security Projectlg...
|16
|3465
|79