logo

Computer Security System Investigation

   

Added on  2023-01-23

22 Pages4632 Words22 Views
University
Semester
COMPUTER SECURITY-SYSTEM
INVESTIGATION
Student ID
Student Name
Submission Date
1

Table of Contents
1. Project Aim....................................................................................................................................3
2. Virtual Machine (VM) Image File Installation Procedure.............................................................3
3. Inspection of the Security System..................................................................................................7
4. Inspection Report and Details of the Security System.................................................................15
5. Additional Security System Suggestions.....................................................................................17
References...........................................................................................................................................20
2

1. Project Aim
System Security is a major cause of concern in today’s world. In computing,
a Virtual Machine (VM) is an imitation of a Computer system. They are based on the
computer architecture and provide the functionality/ Characteristics of a physical computer.
“Widgets Inc” is such a firm which provides virtual machine image. Benny Vandergast Inc is
providing VM ware for testing. These virtual machines provided by Benny Vandergast will
be used by the user and same time they will evaluate the system for security purpose, same
will be used no the new web based store. So, here is where we come into the picture. This
whole project and the aim are to provide Security Evaluation on the VM (Virtual Machines)
images provided. Same time we will inspect and test the various security areas of the whole
framework to identify the loop holes and concerns for security. Use of Special Security
Evaluation Tool shall be made for this task. The “Virtual Machine Image” files will be
tested by performing Security evaluation by the following parameters:
The procedure of investigating the security system.
The instrument used for the security system investigation procedure.
The outcome of the above mentioned security system investigation.
The plan for safe guarding the system against outside attacks.
The concerns regarding the security related problems.
So, this project shall discuss the above points in detail and same time will try to
analyse it in full detail.
2. Virtual Machine (VM) Image File Installation Procedure
1. On the given Portal, the Virtual Machine (VM) file has to be downloaded.
2. Install the Virtual Machine work station after it has been downloaded.
3. After the installation has been completed, open the Virtual Machine (VM) image file. It
will be displayed as the image below (TechRepublic, 2019),
3

Open the Virtual Machine (VM) image file by clicking on it. It will be illustrated as below
(digitalocean.com, 2019).
After this select the VM (Virtual Machine) image File and click on it. This will open the VM
(Virtual Image) image file. It will be displayed as below (kifarunix.com, 2019),
4

Then, open “Ubuntu”* by clicking the Power on button. It will be displayed as shown in the
below image (TechRepublic, 2019),
Next step is to click on the “Move It” icon to transfer the Virtual Image file to the Virtual
Machine (VM) ware Workstation. It will be illustrated as shown in the below image,
5

6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security System Investigation
|20
|2886
|78

Computer Security System Investigation
|18
|2613
|81

Computer Security Project
|21
|3764
|57

System Security Investigation and Proposal
|13
|1808
|1

Computer Security-System Investigation
|17
|3097
|33

Computer Security System Investigation
|17
|3418
|329