logo

Computer Security Project

   

Added on  2023-02-01

16 Pages3465 Words79 Views
University
Semester
Computer Security
Student ID
Student Name
Submission Date

Table of Contents
Part 1 - Project Goal..............................................................................................................................1
Part 2 - Installation of VMware.............................................................................................................1
Part 3 - Inspection of System Security...................................................................................................6
Part 4 - Description of Investigation Results.......................................................................................10
Part 5 - Security System Proposals......................................................................................................12
References...........................................................................................................................................14

Part 1 - Project Goal
A new Project or a Research starts with a particular aim to fulfil or test. Our Project
also has a purpose for which we shall be performing a series of Tests, collecting the test
results, analysing these data and then preparing a Report based on the overall exercise. Now,
this Project’s objective is to carry out a Security Evaluation for a System involving “Virtual
Machine image files”.(Virtual Machine (VM) is an operating system (OS) or application
environment that is installed on software, mimics a dedicated hardware and gives experience
just like a dedicated hardware).
We have identified our Project Objective. Now to reach our destination (Objective) we
shall have a plan. This Project plan will consist of Assessing, Investigate, Collecting data,
Tests, Methods of Analysing Information and finally presenting a detailed Report of our
whole process. The idea is to “pinpoint” the areas which are unsafe and which are the spots
for potential Security threats. Our Project will identify these loop holes (Security), segregate
them, analyse, group them and then aim for their eradication. These security soft spots shall
be identified in the Computers, Operating System, Servers, Hardware, and anywhere within
the framework where a potential threat is identified. Here our specific target is “Virtual
Machine image files” and Security assessment based around it.
The whole process will have the below steps and same will be covered here,
1) System’s Security Inspection details.
2) Security Tools for Inspection, their usage and results.
3) Proposed Security Plan for the System and vulnerable security areas.
We shall explain and present a detailed report, covering all the above points and how best it
shall lead to give the Best Security for our System.
Part 2 - Installation of VMware
Below given steps have to be followed for Installing the VMWare,
1. Download the VMware on the selected Portal.
2. Start the installation process for the VMware work station.
3. Once the Installation has been completed, open it.The above steps have been shown in
the below image (VMWare Workstation 14 Pro)(Ali and Heriyanto, 2011),
1

Click on the “Open a Virtual Machine” and select our Virtual Machine File which
shall be used for this Project. It is displayed as shown in the below image(Bosworth, Kabay
and Whyne, n.d.),
2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security System Investigation
|25
|3821
|87

Computer Security System Investigation
|22
|4632
|22

System Security Investigation and Proposal
|13
|1808
|1

Computer Security System Investigation
|18
|2613
|81

Computer Security System Investigation
|18
|3850
|114

Computer Security System Investigation
|20
|2886
|78