logo

System Security Investigation and Proposal

   

Added on  2022-12-19

13 Pages1808 Words1 Views
 | 
 | 
 | 
University
Semester
Networking
Student ID
Student Name
Submission Date
1
System Security Investigation and Proposal_1

Table of Contents
1. Description of Project............................................................................................ 3
2. Virtual Machine Image File Installation......................................................................3
3. Details of System Security Investigation.....................................................................8
4. System Security Investigation Results........................................................................8
5. Proposal on System Security..................................................................................10
References.............................................................................................................. 13
2
System Security Investigation and Proposal_2

1. Virtual Machine Image File Installation
Main objective of this project is to perform the evaluation of security for the given
virtual machine image. To perform evaluation of security on a given virtual machine image
file:
Describe the how to investigate the system security
Use system security tool to investigate the system security and describe the
results.
Finally, provide the proposal on how the system can be secured and also
address the determined security issues.
First, user needs to install the provided Virtual machine image on VM ware by
follows the below steps,
Download the provided Virtual machine image file on Portal.
After, download and Install the VM ware work station.
Then, open the VM ware workstation and it is illustrated as below
Check the icons on the screen once you open VMware Workstation. Next, open it by clicking
on the “Open a Virtual Machine” option, as shown in the image below,
3
System Security Investigation and Proposal_3

Next, step will be to open the “Ubuntu” by clicking the “Power” on icon.
4
System Security Investigation and Proposal_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security System Investigation
|20
|2886
|78

Computer Security System Investigation
|18
|2613
|81

Computer Security System Investigation
|22
|4632
|22

Computer Security Project
|21
|3764
|57

Computer Security-System Investigation
|12
|1368
|37

Computer Security Project
|16
|3465
|79