logo

Computer Security System Investigation

   

Added on  2023-01-19

20 Pages2886 Words78 Views
 | 
 | 
 | 
University
Semester
COMPUTER SECURITY-SYSTEM
INVESTIGATION
Student ID
Student Name
Submission Date
1
Computer Security System Investigation_1

Table of Contents
Project Description................................................................................................................................3
VM ware Installation.............................................................................................................................3
Description of how investigate the System Security..............................................................................8
Description of the Results....................................................................................................................11
Proposal on how to secure the System.................................................................................................16
References...........................................................................................................................................18
2
Computer Security System Investigation_2

Project Description
Main objective of this project is to perform the evaluation of security for the given
virtual machine image, because the Widgets Inc has contracted Benny Vandergast Inc., for
developing a new web-based store. And, Benny Vandergast Inc., is given a VMware for
testing. So, Widgets Inc., has taken decision to give user to evaluate the system security given
by the company. Therefore, we are performing security evaluation on the given virtual
machine image. Also, identified the security issues on the system by using the one of the
security evaluation tools wish to perform the investigation. To perform evaluation of security
on a given virtual machine image file:
Describe the how to investigate the system security
Use system security tool to investigate the system security and describe the
results.
Finally, provide the proposal on how the system can be secured and also
address the determined security issues.
These are will be analyzed and discussed in detail.
VM ware Installation
Download the provided Virtual machine image file on Portal.
After, download and Install the VM ware work station.
Then, open the VM ware workstation and it is illustrated as below [1].
3
Computer Security System Investigation_3

Click the Open virtual machine and it is illustrated as below.
After, browse the provided virtual machine file and then click the Open to open the
VM file. It is illustrated as below.
4
Computer Security System Investigation_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security System Investigation
|18
|2613
|81

Computer Security System Investigation
|22
|4632
|22

Computer Security Project
|21
|3764
|57

Computer Security-System Investigation
|12
|1368
|37

System Security Investigation and Proposal
|13
|1808
|1

System Security for Ubuntu 18.04
|17
|3603
|52