logo

Computer Security Project

   

Added on  2023-01-23

21 Pages3764 Words57 Views
University
Semester
Computer Security
Student ID
Student Name
Submission Date

Table of Contents
1. Aim of the Project..........................................................................................................................1
2. VMware Installation......................................................................................................................1
3. System Security Investigation........................................................................................................7
4. Results.........................................................................................................................................13
5. Proposal on System Security.......................................................................................................15
References...........................................................................................................................................18

1. Aim of the Project
Today, system Security indicates serious issue which can be caused due to various
reasons. This report will shed light on all the reasons, its impact and solution. In computing,
a Virtual Machine (VM) is a reflection of a Computer system, which depends on the
computer architecture and gives functionality of a physical computer.In this report two firms
are involved namely, “Widgets Inc.” and “Benny Vandergast Inc.” Widgets Inc., is the firm
that gives the virtual machine image, whereas the other firm has given a VMware to be tested
for security reasons and will be utilized for a new web-based store.
The overall aim is to evaluate security for the given VM images. Thus, various
security aspects will be inspected and tested, for recognizing any kind of loop holes and
security problems. For this task, it is suggested to utilize some special security evaluation
tool. With Security evaluation the Virtual Machine Image files will be tested and the below
mentioned parameters will be considered:
A. Explanation on the system security’s investigation.
B. Implementation of system security tool for investigating the system security,
with outcomes.
C. A system security proposal along with the identified security problems
(DONG et al., 2010).
2. VMware Installation
The following are the installation steps to be followed:
On the Portal, the given Virtual machine image file should be downloaded.
Next, complete the installation of VMware work station.
Open it when once installed.
The below represented image helps to understand the above mentioned steps,
1

When it is opened, browse for the virtual machine file that is given and open it, as
illustrated in the below figure (HU et al., 2013).
2

This must be followed by opening Ubuntu, which requires clicking on the Power on button.
3

4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security System Investigation
|20
|2886
|78

Computer Security System Investigation
|18
|2613
|81

Computer Security-System Investigation
|12
|1368
|37

System Security Investigation and Proposal
|13
|1808
|1

Computer Security System Investigation
|22
|4632
|22

System Security for Ubuntu 18.04
|17
|3603
|52