Evaluate tools and techniques for system security

Assignment Help Computer Engineering
Reference no: EM132016196

Assignment on computer security.

Assignment Description

WidgetsInc has contracted Benny Vandergast Inc to develop their new web- based store. Benny Vandergast Inc has provided a VMware virtual machine for testing. WidgetsInc have decided to give you the job of evaluating the security of the system provided by Benny Vandergast Inc.

You should perform a security evaluation on the provided virtual machine image. You have not been supplied with either the IP address of the system or any usernames and passwords, you have have to discover these as part of your investigation.

Requirements

Your report should include:
- A description of how you investigated the security of the system.
- include fully cited information on tools and techniques you used.
- A description of the results obtained.
- A proposal on how to secure the system.
- you should address each of the security issues you find.

Learning Outcomes

1. Propose and justify suitable security for a networked computer system.

2. Use a range of security-related tools.

3. Critically evaluate tools and techniques for system security.

4. Research and report on a security-related topic, using appropriate literature.

Verified Expert

In this project security has been analyzed for the system using the software such as virtual machine for Kali Linux. And for the security ,the tools has been analyzed and used some techniques. And the Kali Linux used the whole part in this project. Through the implementation the widgetsInc password has been found. So for that the security issues are explained and also described about how to cracking the password. And the vulnerabilities are analyzed by the usage of some techniques and that is described in the report.

Reference no: EM132016196

Questions Cloud

Identify the problem in your chosen case study : Review the same case study you selected from last week's Assignment. (Remember, you will be using this same case study throughout the entire course).
Segregated cultural space prompt : Segregated Cultural Space Prompt: Think about your hometown. Did/do you see evidence of segregated cultural space? If yes, give examples.
Isolation of japan during the tokugawa period : Discuss the isolation of Japan during the Tokugawa period, the causes of the isolation and the effect it has on both the economy and society.
Airlines as opposed to major airlines : What attracts flight attendants to work at regional airlines as opposed to major airlines?
Evaluate tools and techniques for system security : CO4509 - Computer Security - Perform a security evaluation on the provided virtual machine image. You have not been supplied with either the IP address
Motion the development of the mass media : Explain how the invention of the telegraph revolutionized communication and set in motion the development of the mass media.
Discuss when first and complementary foods should be added : The change in infant feeding practices in the United States and across the world has generated much debate.
How would you appeal to kinesthetic learners : If you are giving a speech on how to safely check a player in hockey, how would you appeal to Kinesthetic learners? Auditory learners? Visual learners?
Cross-cultural communication : Cross-cultural communication requires you to use clear language. Can you name two or more other challenges related to communicating

Reviews

inf2016196

8/2/2018 2:03:35 AM

Last 4 screenshots clearly showing that attack is happenning from kali linux. root@kali ---> root is the username and kali is the server name of kali linux machine. How to work with kali linux also explained in many pages with screenshots. There also we can see root@kali.. NMAP is used to scan the VM and NMAP is in stalled in kali linux only. Thanks its great work, and thanks a lot for your explanations.

len2016196

6/12/2018 1:11:45 AM

Documentation (10) Grammar, spelling, formatting and how well the investigation is documented. Very poor. For example not referenced, doesn't address the question or very poor spelling and grammar making it hard to understand. Some items are referenced. Poor grammar, spelling. Referenced. Good spelling, grammar. Layout is consistent and make sense. Good quality documentation. All items referenced, figures are labelled. Excellent. Publishable quality.

len2016196

6/12/2018 1:11:37 AM

Implications (30) Descriptions of the issues found and there severity. Brief description. Poor or obvious implications for each vulnerability found. Or only some implications are addressed or the implications don't match up with the severity of the problem. Limited description of the issue and the implications . Either all aspect covered but to a superficial level or only goes into detail of a few of the issues found. Good description of the issue and its implications. All issues addresses. Excellent description of the issue and its implications. Accurate and concise description of each issue. Each issue includes a description of how to exploit the problem. Securing (30) Description of how to address the security issues raised discovered. Brief description doesn't really secure the system. Poor or obvious way of securing the system, e.g. overall recommendation of just firewall/patching rather than the way of dealing with each problem. Limited description of how to secure the issues found. Good description of how to secure the issues found. Each identified issues is addressed. Excellent description of how to secure the problems found.

len2016196

6/12/2018 1:11:30 AM

This allows you to estimate your mark based on which critria you have completed. You should note that you are not guaranteed to get the mark you work out using this tool. This page does not save your settings Fail(10) Pass(50) Merit(60) Distinction(70) 80(80) Investigation (30) Description of the way the investigation was performed Brief description. Investigation is superficial. Some security issues have been identified via the use of automatic tools. Only investigates one area of the system e.g. just web shop, OS or the running services. Investigation includes multiple aspects (OS, services, application etc). Or goes in depth into a single aspect of the system. Good coverage across three or more aspects (OS, services, application etc). Or goes in depth into a two aspects. Excellent coverage across all aspects of the system. Passwords have been recovered rather than overwritten.

Write a Review

Computer Engineering Questions & Answers

  Construct a finite-state machine that models a newspaper

Construct a finite-state machine that models a newspaper vending machine that has a door that can be opened only after either three dimes.

  Determining the total balances forward and total withdrawals

A heading is to emerge at the top of each page and allowance is to be made for the 45 detail lines per page. At the end of the report, print total balances forward, total withdrawals, total deposits, total interest earned and total final account b..

  What are differences between network line continuity testers

What are the differences between network line continuity testers and network cable testers? How can you determine what has happened?

  Modify the code so that a search of tree also stores depth

Modify the code so that a search of the tree also stores the depth of the last node visited. Creating more integer ?les and seeing their effects.

  Which optimization method acheieves the best performance

E19: Numerical Methods for Engineering Applications Spring 2016 - PROJECT 4. Which method is slowest? Fastest? Explain why you think that might be the case. Which optimization method acheieves the best performance, and why

  Question1 obviously conceptual data modelling is a

question1. obviously conceptual data modelling is a time-consuming and costly process. examine potential drawbacks to

  How does implementation differ for product innovation and

how culture affects innovationthe discussion of how different countries governments are involved in the innovation

  What other error-detection techniques are available

What other error-detection techniques are available? How do they compare to parity and cyclic redundancy checksum?

  Make program that displays a digital clock in a window

Write down a program that displays a digital clock in a window using an applet. The clock should show, day of week, date, time, time zone and year.

  Prove that the plaintext used by alice is recovered by bob

Prove that the plaintext used by Alice is recovered by Bob in OFB mode. Prove that the plaintext used by Alice is recovered by Bob in CTR mode.

  Developing a graphical user interface in programming

Developing a graphical user interface in programming is paramount to being successful in the business industry

  How do you remove only the hidden files of your directory

How do you remove only the hidden files of your directory? Does rm * remove these files as well?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd