What are the computer security issues in the virtual machine

Assignment Help Computer Engineering
Reference no: EM131179025 , Length: word count:2000

Computer Security Assignment

Task - Your task is to analyse theoperating system and applications within the supplied Virtual Machine (VM) imageand identify at least15security issues. The VM mimics a scaled down version of a typical end-user's computer. You should disregard any external elements (such as network security, network configuration etc.), and focus your analysis on the Virtual Machine in its isolated form. You are required to separate your analysis into the categories of; operating system issues, software issues, and configuration issues. Your report should address three specific components;

1. What are the computer security issues in the virtual machine?

2. Describe why the issues identified should be of concern to a novice end-user?

You must include supporting references for every security issue identified. Furthermore, you must explain and describe the security issues in a manner that allows novice end-users to understand the implications and concerns raised by the issue being present. You are encouraged to format and structure your assignment using the template provided under the "Assessments" section on Blackboard.

Task Information

  • Do not propose solutions within this assignment. Your task for assignment 1 is to only identify and justify the security issues you have discovered.
  • You must include adequate and appropriate in-text references to add credibility to the security issues you have identified. The issue may be of concern to you, but in a real world it may have little significance.
  • Assume your target audiencehas little expertise in cyber security. As a result you must communicate your findings in a simple manner. Using overly complex descriptions or terminology may result in a loss of marks. Use acronyms correctly. Use analogies if it helps you communicate the identified issue in a simplistic manner.
  • Be creative in how you chose to communicate your findings. Tell the reader why they should be concerned with the security issue identified. Using real world examples and consequences help to show the importance and severity of an issue.
  • Begin your assignment by identifying the types and versions of software installed and the way in which they have been configured. Use the Internet to search for and discover pre-existing issues with the operating system, software and configuration you have discovered.
  • Think outside the box. What would an end-user's computer require for it to be considered secure and how does this compare to the supplied VM?

Around 2000 words and above 10 Referencing Style APA.

Attachment:- Template.rar

Reference no: EM131179025

Questions Cloud

Which bank would you go to for new loan : First National Bank charges 12 percent compounded monthly on its business loans. First United Bank charges 12.2 percent compounded semiannually. Calculate the EAR for each bank. (Enter rounded answers as directed, but do not use rounded numbers in in..
Did carpenter breach that duty in this case : What is the nature of the fiduciary duty that a general partner owes a limited partner? - Did Carpenter breach that duty in this case? Explain in detail, including the advantage this form of business deal has for both partners.
Compare and contrast a work with a movie adaptation : Compare and contrast a work with a movie adaptation. For example, compare the recent movie version of Beowulf to the Anglo-Saxon poem or the film Excalibur to Malory. Let me know what adaptation you'd like to write about if it isn't on this list,..
What is meant by a strategy hierarchy : 1. What are the desired characteristics of a national strategy document? 2. What is meant by a strategy hierarchy?
What are the computer security issues in the virtual machine : What are the computer security issues in the virtual machine? Describe why the issues identified should be of concern to a novice end-user
Providing fairness in the workplace : What is USERRA, and what is its importance? In today's world where employers seem to be diligent in providing fairness in the workplace, is this Act still relevant?
Find the units cost total cost and quantity : Record the inventory, purchases, and cost of merchandise sold data in a perpetual inventory record. -  Find the units cost , total cost and quantity.
Personal or professional setting : What are some other motivational techniques you are familiar with from any personal or professional setting? Were they successful? Why/why not?
Briefly trace the development and growth of the organisation : Briefly trace the development and growth of the organisation from its beginnings to the present through the application of corporate strategies - what types of strategies have these been?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd