logo

Computer Security System Investigation

   

Added on  2022-12-09

17 Pages3418 Words329 Views
University
Semester
COMPUTER SECURITY-SYSTEM
INVESTIGATION
Student ID
Student Name
Submission Date
1

Table of Contents
1. Project Goal........................................................................................................ 3
2. Virtual Machine (VM) Image File Installation Procedure.................................................3
3. Inspection of the Security System.............................................................................. 7
4. Inspection Report and Details of the Security System...................................................15
5. Additional Security System Suggestions...................................................................17
References.............................................................................................................. 20
Project Goal
2

The main aim of this VMware program to indicates this critical issue and tries to
make the best effort to resolve it. Our program needs to review analyses and understand the
issues related to security and threats to a computer. Our main role in this program is a virtual
machine (VM). A VM is the operating system (OS) or application environment, which is
installed on the software, which provides a dedicated hardware frequency and end user, a
virtual computation of the VM ware work station. The VM image is provided by a computer
company, and another company called "Widgets Inc" is being used in the new web-based
store for testing as "Penny Vandergast Inc.". By using VMware, Penny uses the image file of
the VM and asks users to evaluate security features. So, in this program, we are those users
Ask users to evaluate VMS and its safety features. So, in this program, we are those users.
We start our work from this project. Understanding Benny Vandergast's complete safety of
VM images, testing them, experimenting with them, analyzing them, finding weak security
areas, and finally preparing a complete report of all findings and short combs. We can used
for the special security tools on the VM ware windows for the purpose of understand the
security thread on the command box. This is right We verify "virtual machine image" files for
security threats and attacks, which must be based on the following conditions that are include
the Process of the VMware is identified the initial process of the planning the security of
inspection system, investigating the methods, security system, various tools, analyzing the
investigation process output, finding the outside threats and safe guarding, security problem
of the measure on VMware work station of the system. Now we can start to explain the
understand of the each stages of the installing and security purpose of the VM ware
workstation of all points to describe the security of the VM image file on the windows
system.
Task 2 - Virtual Machine (VM) Image File Installation Procedure
we can start the initial step of the process on virtual Machine work station to install on
the operating system after that open the command portal and selecting the VM file after the
operating system is automatically download on the Virtual machine software, once the
download file is successfully complete on the windows system, and once again to check the
hard-disk space of the operating system and finally install the Virtual machine workstation
software on VM image file system (Ahmed and Fatouhi, 2014). The installation process to
complete and the system that can displayed on the windows screen output is, open the new
Virtual machine 14 Pro platform on the system. The displaying the virtual machine windows
can be show in below,
3

The open the VMware image file on the windows system and click on the icon button,The
output is show in below,
The image folder which can open on the VMware work station windows system, as displayed
as below,
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security System Investigation
|18
|3850
|114

Computer Security-System Investigation
|20
|3814
|21

Computer Security System Investigation
|22
|4632
|22

Computer Security-System Investigation
|17
|3097
|33

Computer Security System Investigation
|20
|2886
|78

Computer Security System Investigation
|18
|2613
|81