logo

Computer Security System Investigation

   

Added on  2023-01-20

18 Pages2613 Words81 Views
University
Semester
COMPUTER SECURITY-SYSTEM
INVESTIGATION
Student ID
Student Name
Submission Date
Computer Security System Investigation_1
Table of Contents
1. Project Description........................................................................................................................1
2. VMware Installation......................................................................................................................1
3. Description of how investigate the System Security......................................................................6
4. Description of Result.....................................................................................................................8
5. Proposal on how to Secure the System........................................................................................13
References...........................................................................................................................................16
Computer Security System Investigation_2
1. Project Description
Security evaluation is the primary objective of this report. This evaluation is carried
on a virtual machine image, based on a contract given by Widgets Inc., to Benny Vandergast
Inc. so as to develop a new web-based store. And, Benny Vandergast Inc., is given a VMware
for testing. Thus, Widgets Inc., has decided to give user to do system security evaluation for
the contracted company.
The objective of this report is to conduct the following security evaluation on the
offered virtual machine image file:
1) Description of system security to investigation.
2) Using the system security tool for the investigation of system security.
3) Presenting the determined results.
4) Conclude the report with a proposal that presents the steps on how the system
could be secured. It will also present the found security issues.
2. VMware Installation
With the following steps VMware installation completes:
1) Downloading the offered Virtual machine image file from the Portal.
2) Installing the downloaded VM file on the VMware work station.
3) Opening the VMware workstation.
Click on the Open VM.
1
Computer Security System Investigation_3
Next, browse the given VM file, then click on Open, which opens the VM file.
Turn on the Power on button, and it will allow the Ubuntu to open.
2
Computer Security System Investigation_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security System Investigation
|20
|2886
|78

Computer Security Project
|21
|3764
|57

System Security for Ubuntu 18.04
|17
|3603
|52

Computer Security System Investigation
|22
|4632
|22

Computer Security-System Investigation
|12
|1368
|37

System Security Investigation and Proposal
|13
|1808
|1