Evaluate tools and techniques for system security

Assignment Help Computer Engineering
Reference no: EM132016196

Assignment on computer security.

Assignment Description

WidgetsInc has contracted Benny Vandergast Inc to develop their new web- based store. Benny Vandergast Inc has provided a VMware virtual machine for testing. WidgetsInc have decided to give you the job of evaluating the security of the system provided by Benny Vandergast Inc.

You should perform a security evaluation on the provided virtual machine image. You have not been supplied with either the IP address of the system or any usernames and passwords, you have have to discover these as part of your investigation.

Requirements

Your report should include:
- A description of how you investigated the security of the system.
- include fully cited information on tools and techniques you used.
- A description of the results obtained.
- A proposal on how to secure the system.
- you should address each of the security issues you find.

Learning Outcomes

1. Propose and justify suitable security for a networked computer system.

2. Use a range of security-related tools.

3. Critically evaluate tools and techniques for system security.

4. Research and report on a security-related topic, using appropriate literature.

Verified Expert

In this project security has been analyzed for the system using the software such as virtual machine for Kali Linux. And for the security ,the tools has been analyzed and used some techniques. And the Kali Linux used the whole part in this project. Through the implementation the widgetsInc password has been found. So for that the security issues are explained and also described about how to cracking the password. And the vulnerabilities are analyzed by the usage of some techniques and that is described in the report.

Reference no: EM132016196

Questions Cloud

Identify the problem in your chosen case study : Review the same case study you selected from last week's Assignment. (Remember, you will be using this same case study throughout the entire course).
Segregated cultural space prompt : Segregated Cultural Space Prompt: Think about your hometown. Did/do you see evidence of segregated cultural space? If yes, give examples.
Isolation of japan during the tokugawa period : Discuss the isolation of Japan during the Tokugawa period, the causes of the isolation and the effect it has on both the economy and society.
Airlines as opposed to major airlines : What attracts flight attendants to work at regional airlines as opposed to major airlines?
Evaluate tools and techniques for system security : CO4509 - Computer Security - Perform a security evaluation on the provided virtual machine image. You have not been supplied with either the IP address
Motion the development of the mass media : Explain how the invention of the telegraph revolutionized communication and set in motion the development of the mass media.
Discuss when first and complementary foods should be added : The change in infant feeding practices in the United States and across the world has generated much debate.
How would you appeal to kinesthetic learners : If you are giving a speech on how to safely check a player in hockey, how would you appeal to Kinesthetic learners? Auditory learners? Visual learners?
Cross-cultural communication : Cross-cultural communication requires you to use clear language. Can you name two or more other challenges related to communicating

Reviews

inf2016196

8/2/2018 2:03:35 AM

Last 4 screenshots clearly showing that attack is happenning from kali linux. root@kali ---> root is the username and kali is the server name of kali linux machine. How to work with kali linux also explained in many pages with screenshots. There also we can see root@kali.. NMAP is used to scan the VM and NMAP is in stalled in kali linux only. Thanks its great work, and thanks a lot for your explanations.

len2016196

6/12/2018 1:11:45 AM

Documentation (10) Grammar, spelling, formatting and how well the investigation is documented. Very poor. For example not referenced, doesn't address the question or very poor spelling and grammar making it hard to understand. Some items are referenced. Poor grammar, spelling. Referenced. Good spelling, grammar. Layout is consistent and make sense. Good quality documentation. All items referenced, figures are labelled. Excellent. Publishable quality.

len2016196

6/12/2018 1:11:37 AM

Implications (30) Descriptions of the issues found and there severity. Brief description. Poor or obvious implications for each vulnerability found. Or only some implications are addressed or the implications don't match up with the severity of the problem. Limited description of the issue and the implications . Either all aspect covered but to a superficial level or only goes into detail of a few of the issues found. Good description of the issue and its implications. All issues addresses. Excellent description of the issue and its implications. Accurate and concise description of each issue. Each issue includes a description of how to exploit the problem. Securing (30) Description of how to address the security issues raised discovered. Brief description doesn't really secure the system. Poor or obvious way of securing the system, e.g. overall recommendation of just firewall/patching rather than the way of dealing with each problem. Limited description of how to secure the issues found. Good description of how to secure the issues found. Each identified issues is addressed. Excellent description of how to secure the problems found.

len2016196

6/12/2018 1:11:30 AM

This allows you to estimate your mark based on which critria you have completed. You should note that you are not guaranteed to get the mark you work out using this tool. This page does not save your settings Fail(10) Pass(50) Merit(60) Distinction(70) 80(80) Investigation (30) Description of the way the investigation was performed Brief description. Investigation is superficial. Some security issues have been identified via the use of automatic tools. Only investigates one area of the system e.g. just web shop, OS or the running services. Investigation includes multiple aspects (OS, services, application etc). Or goes in depth into a single aspect of the system. Good coverage across three or more aspects (OS, services, application etc). Or goes in depth into a two aspects. Excellent coverage across all aspects of the system. Passwords have been recovered rather than overwritten.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd