logo

Computer Security System Investigation

   

Added on  2023-02-01

25 Pages3821 Words87 Views
University
Semester
COMPUTER SECURITY-SYSTEM
INVESTIGATION
Student ID
Student Name
Submission Date
1

Table of Contents
1. Project Description............................................................................................................................3
2. VM ware Image File Installation......................................................................................................3
3. Description of Investigate of the System Security............................................................................8
4. Description of the Results...............................................................................................................11
5. Proposal on how to secure the System............................................................................................22
References...........................................................................................................................................24
2

Project Description
In this Project we shall discuss about System Security and how best to utilise different
tools for minimising the threats to our Network. We shall be using the platform of VM image
files. i.e. Virtual Machines. Now, a virtual machine is a software computer that, like a
physical computer, runs an operating system and applications and is based on computer
architectures which provides functionality of a physical computer. The virtual machine is
comprised of a set of specification and configuration files and is backed by the physical
resources of a host.
VM ware Image File Installation
Many firms provide VM’s in the market based upon the Operating System in use.
Widget Inc is one such company and we shall use the VM provided by it for our Project.
What we will be doing during this whole project is that, we shall conduct various Tests and
Security checks on our System on VM platform and then, identify, understand, study and
make a Result based on our tests (Lange, 2018). Now, our concentration of these tests and
trials will be specifically for Security and Safety in general. We shall make use of particular
Safety Tools like Lynis to conduct the above mentioned Tests on the VM’s.
a. The Exercise of Testing and Assessment will cover the below topics,
b. A Planned method of Security System Inspection.
c. Tools required for this Inspection of Security.
d. Analysing the outcome of this Inspection
No we come to the part where the VM file will be installed for use (Hamid, 2017). Follow the
below steps for using the VM File on the system,
The VM File has to be downloaded on our System in use.
Start installing the VM work station once the down load has been completed.
Complete the process of installing the VM work station.
Open the VM work station as shown in the below image.
3

Open the VM file as shown in the image,
Next select our VM image file and open it by clicking on the file as shown in the image
below,
4

Next, will be to click the Power On button to open Ubuntu.
5

VM Ubuntu will be successfully installed and now the next step in this process is to enter the
User name & password. The values for these parameters are,
Username: user
Password: Password@123
Now our objective of this Project is to check the Security standard and level and for this we
have to hack the system i.e. the VM system. Follow these steps for the same,
Boot into the recovery mode.
6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security System Investigation
|22
|4632
|22

Computer Security Project
|16
|3465
|79

System Security Investigation and Proposal
|13
|1808
|1

Computer Security System Investigation
|20
|2886
|78

Computer Security-System Investigation
|20
|3814
|21

Computer Security System Investigation
|18
|2613
|81