logo

Computer Security-System Investigation

   

Added on  2023-01-23

17 Pages3097 Words33 Views
University
Semester
COMPUTER SECURITY-SYSTEM INVESTIGATION
Student ID
Student Name
Submission Date
1

Table of Contents
Project Aim...........................................................................................................................................3
Procedure for Installation for Virtual Machine (VM) Image File..........................................................4
Security System Investigation.............................................................................................................10
Security System Investigation Analysis Report...................................................................................12
Proposal on How to Security a System................................................................................................14
References...........................................................................................................................................16
2

Project Aim
Virtual Machine refers to a computer file. It is usually known as an image, which acts
just as a real computer. This means, it creates a computer inside a computer. It runs on
Windows, similar to other program, and on a virtual machine it gives same experience to the
end user like on a host OS. The VM is sandboxed from the other systems, which means that
the software within a VM can’t escape from the computer. Widgets, Inc. distributes computer
components and equipment. The Company provides products including motherboards,
controller cards, video cards, hard drives, CPUs, monitors, optical drives, sound cards, and
power supplies.
For their Virtual Machine Testing, they have been provided the software and the
program by another firm, “Benny Vandergast Inc”. The software’s and the tool’s so provided
will be used by the users on these Virtual Machine images and then the results so will be
analyzed and discussed.
And at this point, this Project takes shape and is utilized. We shall analyze the whole
system and run the tools and system software’s for evaluation and analysis of the Virtual
Machine Images so provided. This will be done on the entire framework of the system
including the different sectors and the areas of the full system. We shall be using “Special
Security Evaluation Tool” for this task of getting the analysis of the entire Framework/
System. The points taken into consideration for this Evaluation and Analysis will be based on
the below given points:
The Outline/Guideline for the System Security Inspection procedure.
The Tools/ Instruments to be used for the Security Inspection.
The Result and the Conclusion after the Inspection of the System is over.
A scheme made for protecting the system against external threats.
The drawbacks and areas of concern related to the issues faced for the security
system.
A thorough analyses and reporting of the entire framework of the security system shall be
taken into consideration in this Project.
Procedure for Installation for Virtual Machine (VM) Image File
1. Download the VM image file on a proposed Portal.
3

2. Once the downloading has been completed, install all the files for the Virtual Machine
work station.
3. Click and Open the VM image file once the Installation process has been completed.
The display will be like the image below (Boelen, 2019),
The below image will be display once we open the Virtual Machine (VM) image file by
clicking on it.
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security System Investigation
|22
|4632
|22

Computer Security System Investigation
|25
|3821
|87

Computer Security-System Investigation
|20
|3814
|21

Computer Security System Investigation
|18
|3850
|114

Computer Security System Investigation
|17
|3418
|329

Computer Security Project
|16
|3465
|79