logo

Computer Security System Investigation

   

Added on  2023-02-01

20 Pages4395 Words42 Views
University
Semester
COMPUTER SECURITY-SYSTEM
INVESTIGATION
Student ID
Student Name
Submission Date
1

Table of Contents
1. Project Goal...................................................................................................................................3
2. Installation Process of Virtual Machine (VM) Image File.............................................................3
3. Inspection of the Security System.......................................................................... . .9
4. Inspection Report and Details of the Security System.................................................................15
5. Additional Security System Suggestions.....................................................................................17
References...........................................................................................................................................20
2

1) Project Goal
Every System is always under a constant threat of Data Theft or Information Hacking.
Security concern is one of the top most priorities to any Administrator. With the development
of sophisticated viruses and stubborn Malwares, it becomes more essential to keep the
System Safe and Secured. This protection can be of physical type or a Software based tool.
Security is an ongoing process and a constant developing model. Ultimately our goal is the
Security of our System. Delicate and important information that is handled by the System and
users accessing this data have to be careful. This is more the case for multi-users on a
common platform and a shared system. There should be an authorized way in which this
information is handled and used. Security System handles this part of the system, together
with improvements, suggestions, updates and vulnerable areas of the entire framework.
This Project’s Goal is System Security Study and Assessment. How best the existing tools
can be used to keep the security at its optimum level. We shall be making use of a VM
(Virtual Machine Image File) to conduct our Security Analysis and Evaluation. A “Virtual
Machine (VM)” is an emulation of a computer system. Virtual machines are based on
computer architectures and provide functionality of a physical computer. Their
implementations may involve specialized hardware, software, or a combination. They mimic a
normal computer with its full functionality. Widget Inc is a company involved in
manufacturing and distribution of Computer Hardware and Software. They are building an E-
commerce store and for that they require their VM files to be examined for security and safety
attributes. They are giving this job to another company called “Benny Vandergast Inc”. And
at this point we come in to the picture. Benny Vandergast wants us to test these VM image
files for Security concerns.
And thus we start with our project of System Security Evaluation, analysis, Reporting and
Consequences. We will conduct this on the VM image files as provided by Benny Vandergast.
This shall be carried out by using “Special Security Tools” of which we shall discuss in
detail, further ahead in this project. The parameter that we shall be using for this whole
security Project will include buy not limited to the following,
a. Understanding and preparing a Well-defined Security Inspection plan.
b. Select the best tools/ Methods that suits the Security plan.
c. Study the analyses after the Security Inspection has been completed.
d. Understand the weak, vulnerable areas and how to strengthen them.
3

e. Security corrections and further precautions to be taken.
So now we shall actually start our Project by keeping the above points as our tasks for
the Security System Evaluation of our VM Image files.
2) Installation Process for Virtual Machine (VM) Image File
To use the VM image file, we shall first install the “VMware Work Station” on our platform.
The steps involved in this are,
(“VMware Workstation” it enables users to set up virtual machines (VMs) on a single
physical machine, and use them simultaneously along with the actual machine. Each virtual
machine can execute its own operating system).
Download the VMware Station on our Portal from the VMware website.
Install the VMware Station once the downloading has been completed.
The “Workstation 14Pro” shall look like the below image, once when the installation
has been completed (Gunawan et al., 2018).
Next step is to access our VM Image file by clicking the center icon as shown in the below
image,
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
System Security Investigation for Virtual Machine Image File
|27
|4008
|26

Computer Security System Investigation
|18
|3850
|114

Computer Security-System Investigation
|20
|3814
|21

Computer Security System Investigation
|17
|3418
|329

Computer Security-System Investigation
|17
|3097
|33

Computer Security System Investigation
|22
|4632
|22