CO4509 Computer Security Assignment

Assignment Help Computer Network Security
Reference no: EM132517959 , Length: word count:3000

CO4509 Computer Security - University of Central Lancashire

Assignment Description

WidgetsInc has contracted Benny Vandergast Inc to develop their new web- based store. Benny Vandergast Inc has provided a VMware virtual machine for testing. WidgetsInc have decided to give you the job of evaluating the security of the system provided by Benny Vandergast Inc.

You should perform a security evaluation on the provided virtual machine image. You have not been supplied with either the IP address of the system or any usernames and passwords, you have have to discover these as part of your investigation.

Requirements

Your report should include:
• A description of how you investigated the security of the system.
- include fully cited information on tools and techniques you used.
• A description of the results obtained.
• A proposal on how to secure the system.
- you should address each of the security issues you find.

Learning Outcome 1:. Propose and justify suitable security for a networked computer system.
Learning Outcome 2. Use a range of security-related tools.
Learning Outcome 3. Critically evaluate tools and techniques for system security.
Learning Outcome 4. Research and report on a security-related topic, using appropriate literature.

Attachment:- Computer Security.rar

Reference no: EM132517959

Questions Cloud

Analysis of scarcity of resources and plenty of demands : Economics is concerned with the analysis of scarcity of resources and plenty of demands". Discuss.
Prepare statement of retained earnings with adjustment : Prepare Statement of Retained Earnings with adjustment of irregular items. Differentiate between a condense and multiple step income statement
Foreign direct investment : You are launching a "Deep Fried Burger" in a foreign country through Foreign Direct Investment.
What is the definition of gross domestic product : What is the definition of Gross Domestic Product when it comes to Macroeconomics?
CO4509 Computer Security Assignment : CO4509 Computer Security Assignment Help and Solution, University of Central Lancashire - Assessment Writing Service - Propose and justify suitable security
Calculate monthly operating income : Calculate monthly operating income (or loss) if a Br.2.50 per unit reduction in selling price results in a volume increase to 8,700 units per month.
Summarize thoughts about relevancy of philosopher writings : Read about the different theorists and then summarize your thoughts about the relevancy of the philosopher's writings to today's healthcare issues.
Do think transfer pricing is useful to firms that operate : Do you think Transfer pricing is useful to firms that operate in the Pacific Island Countries? Justify your response with appropriate examples
Leadership theories grading guide : As a leader, you often need to display or clarify a concept. A matrix is a grid that contains information and offers a visual model of ideas.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Minimum contacts test

Compare the minimum contacts test, as it is applied to the bricks-and-mortar activity of businesses, to their cyberspace activity. If you were a small business

  What sort of attack is it intended to detect

What sort of attack is it intended to detect? What are the key differences between user-centric and target-centric monitoring in behavioral data forensics?

  Compare and contrast different approaches to system analysis

MN611 - System Architecture - Melbourne Institute of technology - Cloud Based Smart Application Management - Compare and contrast different approaches to system

  Case study- ping sweeps and port scans

Case Study: Ping Sweeps and Port Scans, Your boss has just heard about some nefarious computer activities called ping sweeps and port scans

  Fraud and risk factors and enterprise systems

Review the Fraud Risk Factors. Choose one (1) factor which you believe is the most important. Justify your response. Next, choose one (1) factor and determine two (2) policies that a company could put in place in order to counter the risk factor i..

  Ipsec provides security at the network layer

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP

  Differences between software security and network security

Explain Differences between Software Security, Application Security, Web Application Security and Network Security.

  Models of cloud computing according to the nist

What are the three models of cloud computing according to the NIST clouding computing reference architecture? List the advantages and disadvantages of each model.

  Evaluate software solutions to security problems

Security is a major concern for many mission-critical applications.  The focus of the assignment is specifically on protocols that contain known vulnerabilities.

  Explaining characteristic of san or a nas configuration

Storage Area Networks (SAN) and Network Attached Storage (NAS) each give high capacity file storage. For the following list, indicate whether the list item is more characteristic of a SAN or a NAS configuration.

  How to form the trojan integrated cirucit

How to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the output

  Describe the types of sensors that can be used in a nids

What advantages do a Distributed HIDS provide over a single system HIDS? Describe the types of sensors that can be used in a NIDS.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd