Perform a security evaluation

Assignment Help Other Subject
Reference no: EM132015459 , Length: word count:3000

Assignment Description

WidgetsInc has contracted Benny Vandergast Inc to develop their new web- based store. Benny Vandergast Inc has provided a VMware virtual machine for testing. WidgetsInc have decided to give you the job of evaluating the security of the system provided by Benny Vandergast Inc.

You should perform a security evaluation on the provided virtual machine image. You have not been supplied with either the IP address of the system or any usernames and passwords, you have have to discover these as part of your investigation.

Requirements
Your report should include:
• A description of how you investigated the security of the system.
- include fully cited information on tools and techniques you used.
• A description of the results obtained.
• A proposal on how to secure the system.
- you should address each of the security issues you find.

Learning Outcomes

  • Propose and justify suitable security for a networked computer system.
  • Use a range of security-related tools.
  • Critically evaluate tools and techniques for system security.
  • Research and report on a security-related topic, using appropriate literature.

Reference no: EM132015459

Questions Cloud

Calculate the equilibrium constant for reaction : Consider the insoluble compound iron(II) sulfide , FeS . The iron(II) ion also forms a complex with cyanide ions . What is the balanced net ionic equation
Develop a qualitative research plan for a topic : Develop a qualitative research plan for a topic and research question applicable to a specific field of specialization.
Heating two different samples of water at sea level : While heating two different samples of water at sea level, one boils at 102°C and one boils at 99.2°C. Calculate the percent error for each sample.
What is the expense recognition principle : What is the revenue recognition principle? What is the expense recognition principle? In your opinion, why are these important to financial reporting?
Perform a security evaluation : CO4509 - Computer Security - Perform a security evaluation on the provided virtual machine image. You have not been supplied with either the IP address
Concentration of hydroxide ion : What is the concentration of hydroxide ion when phosphate ion begins to precipitate?
Balanced net ionic equation : Consider the insoluble compound zinc sulfide , ZnS. The zinc ion also forms a complex with hydroxide ions. What is the balanced net ionic equation
Discuss about bystander of violence from films : Locate, describe and analyze one example of a bystander of violence from films. The first sentence should have the word "bystander" and "film" within it.
Define molecules as having an ionic bond : Define molecules as having an ionic bond, a covalent bond and a polar bond. Describe how that makes each of your 3 choices different

Reviews

len2015459

6/11/2018 4:48:13 AM

Documentation (10) Grammar, spelling, formatting and how well the investigation is documented. Very poor. For example not referenced, doesn't address the question or very poor spelling and grammar making it hard to understand. Some items are referenced. Poor grammar, spelling. Referenced. Good spelling, grammar. Layout is consistent and make sense. Good quality documentation. All items referenced, figures are labelled. Excellent. Publishable quality.

len2015459

6/11/2018 4:48:07 AM

Implications (30) Descriptions of the issues found and there severity. Brief description. Poor or obvious implications for each vulnerability found. Or only some implications are addressed or the implications don't match up with the severity of the problem. Limited description of the issue and the implications . Either all aspect covered but to a superficial level or only goes into detail of a few of the issues found. Good description of the issue and its implications. All issues addresses. Excellent description of the issue and its implications. Accurate and concise description of each issue. Each issue includes a description of how to exploit the problem. Securing (30) Description of how to address the security issues raised discovered. Brief description doesn't really secure the system. Poor or obvious way of securing the system, e.g. overall recommendation of just firewall/patching rather than the way of dealing with each problem. Limited description of how to secure the issues found. Good description of how to secure the issues found. Each identified issues is addressed. Excellent description of how to secure the problems found.

len2015459

6/11/2018 4:48:00 AM

This allows you to estimate your mark based on which critria you have completed. You should note that you are not guaranteed to get the mark you work out using this tool. This page does not save your settings Fail(10) Pass(50) Merit(60) Distinction(70) 80(80) Investigation (30) Description of the way the investigation was performed Brief description. Investigation is superficial. Some security issues have been identified via the use of automatic tools. Only investigates one area of the system e.g. just web shop, OS or the running services. Investigation includes multiple aspects (OS, services, application etc). Or goes in depth into a single aspect of the system. Good coverage across three or more aspects (OS, services, application etc). Or goes in depth into a two aspects. Excellent coverage across all aspects of the system. Passwords have been recovered rather than overwritten.

len2015459

6/11/2018 4:47:34 AM

Securing (30) Brief description doesn’t re- ally secure the system. Poor or obvious way of securing the system, e.g. overall recommendation of just firewall/patching rather than the way of dealing with each problem. Limited description of how to secure the issues found. Good description of how to secure the issues found. Each identified issues is ad- dressed. Excellent description of how to secure the problems found. Documentation(10) Very poor. For example not referenced, doesn’t address the question or very poor spelling and grammar mak- ing it hard to understand. Some items are referenced. Poor grammar, spelling. Referenced. Good spelling, grammar. Layout is consis- tent and make sense. Good quality documenta- tion. All items referenced, figures are labelled. Excellent. Publishable qual- ity.

len2015459

6/11/2018 4:47:28 AM

Implications (30) Brief description. Poor or obvious implications for each vulnerability found. Or only some implications are addressed or the impli- cations don’t match up with the severity of the problem. Limited description of the issue and the implications . Either all aspect covered but to a superficial level or only goes into detail of a few of the issues found. Good description of the is- sue and its implications. All issues addresses. Excellent description of the issue and its implications. Accurate and concise de- scription of each issue. Each issue includes a description of how to exploit the prob- lem.

len2015459

6/11/2018 4:47:15 AM

Assessment criteria Fail (10) Pass (50) Merit (60) Distinction (70) 80 (80) Investigation (30) Brief description. Investigation is superficial. Some security issues have been identified via the use of automatic tools. Only inves- tigates one area of the sys- tem e.g. just web shop, OS or the running services. Investigation includes mul- tiple aspects (OS, services, application etc). Or goes in depth into a single aspect of the system. Good coverage across three or more aspects (OS, ser- vices, application etc). Or goes in depth into a two as- pects. Excellent coverage across all aspects of the system. Pass- words have been recovered rather than overwritten.

len2015459

6/11/2018 4:46:46 AM

The assignment work should be submitted as a Word document (.docx) or Portable Document Format (.pdf) to the appropriate assignment submission slot on Blackboard1 before 11:59pm on the 25th. Late work Late work must be submitted to eLearn in the required assignment slot. Penalties for late submission Except where an extension of the hand-in deadline date has been approved (using extenuating circumstances forms), lateness penalties will be applied in accordance with University policy as shown in Table 12. (Working) Days Late Penalty up to 5 maximum mark 50% more than 5 0%

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd