What are the computer security issues in the virtual machine

Assignment Help Computer Engineering
Reference no: EM131179025 , Length: word count:2000

Computer Security Assignment

Task - Your task is to analyse theoperating system and applications within the supplied Virtual Machine (VM) imageand identify at least15security issues. The VM mimics a scaled down version of a typical end-user's computer. You should disregard any external elements (such as network security, network configuration etc.), and focus your analysis on the Virtual Machine in its isolated form. You are required to separate your analysis into the categories of; operating system issues, software issues, and configuration issues. Your report should address three specific components;

1. What are the computer security issues in the virtual machine?

2. Describe why the issues identified should be of concern to a novice end-user?

You must include supporting references for every security issue identified. Furthermore, you must explain and describe the security issues in a manner that allows novice end-users to understand the implications and concerns raised by the issue being present. You are encouraged to format and structure your assignment using the template provided under the "Assessments" section on Blackboard.

Task Information

  • Do not propose solutions within this assignment. Your task for assignment 1 is to only identify and justify the security issues you have discovered.
  • You must include adequate and appropriate in-text references to add credibility to the security issues you have identified. The issue may be of concern to you, but in a real world it may have little significance.
  • Assume your target audiencehas little expertise in cyber security. As a result you must communicate your findings in a simple manner. Using overly complex descriptions or terminology may result in a loss of marks. Use acronyms correctly. Use analogies if it helps you communicate the identified issue in a simplistic manner.
  • Be creative in how you chose to communicate your findings. Tell the reader why they should be concerned with the security issue identified. Using real world examples and consequences help to show the importance and severity of an issue.
  • Begin your assignment by identifying the types and versions of software installed and the way in which they have been configured. Use the Internet to search for and discover pre-existing issues with the operating system, software and configuration you have discovered.
  • Think outside the box. What would an end-user's computer require for it to be considered secure and how does this compare to the supplied VM?

Around 2000 words and above 10 Referencing Style APA.

Attachment:- Template.rar

Reference no: EM131179025

Questions Cloud

Which bank would you go to for new loan : First National Bank charges 12 percent compounded monthly on its business loans. First United Bank charges 12.2 percent compounded semiannually. Calculate the EAR for each bank. (Enter rounded answers as directed, but do not use rounded numbers in in..
Did carpenter breach that duty in this case : What is the nature of the fiduciary duty that a general partner owes a limited partner? - Did Carpenter breach that duty in this case? Explain in detail, including the advantage this form of business deal has for both partners.
Compare and contrast a work with a movie adaptation : Compare and contrast a work with a movie adaptation. For example, compare the recent movie version of Beowulf to the Anglo-Saxon poem or the film Excalibur to Malory. Let me know what adaptation you'd like to write about if it isn't on this list,..
What is meant by a strategy hierarchy : 1. What are the desired characteristics of a national strategy document? 2. What is meant by a strategy hierarchy?
What are the computer security issues in the virtual machine : What are the computer security issues in the virtual machine? Describe why the issues identified should be of concern to a novice end-user
Providing fairness in the workplace : What is USERRA, and what is its importance? In today's world where employers seem to be diligent in providing fairness in the workplace, is this Act still relevant?
Find the units cost total cost and quantity : Record the inventory, purchases, and cost of merchandise sold data in a perpetual inventory record. -  Find the units cost , total cost and quantity.
Personal or professional setting : What are some other motivational techniques you are familiar with from any personal or professional setting? Were they successful? Why/why not?
Briefly trace the development and growth of the organisation : Briefly trace the development and growth of the organisation from its beginnings to the present through the application of corporate strategies - what types of strategies have these been?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Simple annual interest and the remainder

She borrowed the maximum amount she could at 3.5% simple annual interest and the remainder at 7% simple annual interest. At the end of the first year, she owed $259 in interest. How much was borrowed at each rate?

  Find minimal cover and identify all possible candidate keys

Find minimal cover and identify all possible candidate keys - Functional Dependencies

  Create program that will read a list of student last names

create program that will read a list of student last names

  Write down a program which compute the average of a group

write a program that calculate the average of a group of test scores where the lowest score is dropped. it should use

  Find out and compare some of the differences

There are a number of other Schema languages defined for use with XML documents apart from DTD and W3C XML Schema. One of these is DSD.

  Information security

What skills are required by personnel working in the information security? State some job titles in field and come up with some required qualifications and some desirable qualifications.

  Is statement a above legal or is casting required explain

What is an abstract class and how does it differ from a regular class? Is statement a above legal, or is casting required? Explain

  Create application that list accounts from a dictionary

Create an application that list accounts from a Dictionary Object. Create an Account Class that contains an ID, Name, and Balance.  Disaply the account in a ListBox.

  Write a 700 to 1050 word paper on a specific web or mobile

write a 700 to 1050 word paper on a specific web or mobile application.describe a specific web or mobile applications

  Write a maple procedure

Write a Maple procedure that solves for y(1) in the initial value problem

  List the merits of using mobile devices from the point of

list the advantages of using mobile devices from the point of view of a fitter salesperson. next list the challenges of

  The ways to depict constraint graph

The ways to depict constraint graph? illustrate how splitting a domain can be used to solve this problem.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd