logo

System Security Investigation for Virtual Machine Image File

Evaluate the security of a virtual machine image provided by Benny Vandergast Inc for WidgetsInc's web-based store.

27 Pages4008 Words26 Views
   

Added on  2023-01-23

About This Document

This document provides a detailed description of the project, installation of virtual machine image file, system security investigation, and proposal on system security. It covers topics such as evaluating system security, using system security tools, vulnerability assessment, and details of system security investigation.

System Security Investigation for Virtual Machine Image File

Evaluate the security of a virtual machine image provided by Benny Vandergast Inc for WidgetsInc's web-based store.

   Added on 2023-01-23

ShareRelated Documents
University
Semester
Networking
Student ID
Student Name
Submission Date
1
System Security Investigation for Virtual Machine Image File_1
Table of Contents
1. Description of Project....................................................................................................................3
2. Virtual Machine Image File Installation........................................................................................4
3. Details of System Security Investigation.......................................................................................9
4. System Security Investigation Results.........................................................................................12
5. Proposal on System Security.......................................................................................................23
References...........................................................................................................................................26
2
System Security Investigation for Virtual Machine Image File_2
1. Description of Project
Virtual Machine (VM) is similar to computer system, which depends on the computer
architectures for delivering the physical computer’s providing functionalities. Its
implementations might contain specialized software, hardware, or a mix of both. Whereas,
Ubuntu refers to a Linux OS, which is free and offers community and professional support. It
runs from the desktop, to the cloud and then to the rest of the internet connected devices.
Every Project work will have a certain Goal to fulfil, certain destination to reach. There
will be a purpose to the whole exercise of conducting and planning of a Project. Our Project
aims to conduct an assessment of the Security System for VM image file. A firm by the name
of “Benny Vandergast Inc” has been given the task of providing evaluation and testing of the
Virtual Machine (VM) image files, which was provided by the “Widgets Inc”. Now,
Widgets, Inc. is a firm that is into the business of Computers. They distribute computer
components and equipment’s in addition to hard drives, controller cards, motherboards, etc.
So, “Benny Vandergast Inc” has given Virtual Machines for testing of the system. They have
done the task of setting up the system which will be used by “Widgets Inc”. “Widgets Inc”
now has to analyse this security system as provided by “Benny Vandergast Inc”. So, here we
come into the picture.
Our Task for this Project aims at Evaluating, Inspecting and finally summarizing a
detailed report for the whole system security framework identifying the “vulnerabilities” and
how efficiently it can be tackled. Vulnerability evaluation empowers to perceive, classify and
describe the security holes that are called as vulnerabilities, among the network infrastructure,
computers, software, and hardware systems. In case that the vulnerabilities are distinguished
as a component of any vulnerability check, at that point this focuses out the requirement for
the improvement of vulnerability.
As the organizations endeavor to secure their information, computer systems, and
staff from cyber-attacks, many of them have put intense money and effort in Network/System
Security Tools which intend to shield the network perimeter from any kind of worms, viruses,
threats and DDoS attacks.
This same tool we shall be using for our Project in evaluation and overall analysis of
the Virtual Machine image files. Now, the steps involved in this whole process will cover the
below given topics,
Details of the process to evaluate the System Security
3
System Security Investigation for Virtual Machine Image File_3
Use of System Security Tools (e.q. Grabber, Iron Wasp) to inspect and give
the outcome of the overall system status.
In the end, the process of vulnerability assessment supports to decrease the
chances of attack from the hacker to breach the System Network, and to gain
better knowledge of risks, assets and their vulnerabilities for an organization.
These Project aims to understand all of the above points and give a detailed understanding of
the Security System.
2. Virtual Machine Image File Installation
We shall start the process by identifying the Virtual Machine image file and then
downloading the same file on the system. The Next step will be to download the VMware
Workstation on the same portal. Complete the downloading of the file and next, install the
VMware Workstation. Once it has been installed, open the VMware Workstation. The blow
image shows the same. The Virtual Machine can now be opened by clicking on the icon as
shown in the below image,
Check the icons on the screen once you open VMware Workstation. Next, open it by clicking
on the “Open a Virtual Machine” option, as shown in the image below,
4
System Security Investigation for Virtual Machine Image File_4
Next, step will be to open the “Ubuntu” by clicking the “Power” on icon.
5
System Security Investigation for Virtual Machine Image File_5
Move “VM image file” after clicking and dragging on it. It is shown as below,
6
System Security Investigation for Virtual Machine Image File_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security System Investigation
|20
|4395
|42

Computer Security System Investigation
|18
|3850
|114

Computer Security-System Investigation
|20
|3814
|21

Computer Security System Investigation
|17
|3418
|329

Computer Security System Investigation
|22
|4632
|22

Computer Security-System Investigation
|17
|3097
|33