What are the computer security issues in the virtual


Computer Security Assignment

Task - Your task is to analyse theoperating system and applications within the supplied Virtual Machine (VM) imageand identify at least15security issues. The VM mimics a scaled down version of a typical end-user's computer. You should disregard any external elements (such as network security, network configuration etc.), and focus your analysis on the Virtual Machine in its isolated form. You are required to separate your analysis into the categories of; operating system issues, software issues, and configuration issues. Your report should address three specific components;

1. What are the computer security issues in the virtual machine?

2. Describe why the issues identified should be of concern to a novice end-user?

You must include supporting references for every security issue identified. Furthermore, you must explain and describe the security issues in a manner that allows novice end-users to understand the implications and concerns raised by the issue being present. You are encouraged to format and structure your assignment using the template provided under the "Assessments" section on Blackboard.

Task Information

  • Do not propose solutions within this assignment. Your task for assignment 1 is to only identify and justify the security issues you have discovered.
  • You must include adequate and appropriate in-text references to add credibility to the security issues you have identified. The issue may be of concern to you, but in a real world it may have little significance.
  • Assume your target audiencehas little expertise in cyber security. As a result you must communicate your findings in a simple manner. Using overly complex descriptions or terminology may result in a loss of marks. Use acronyms correctly. Use analogies if it helps you communicate the identified issue in a simplistic manner.
  • Be creative in how you chose to communicate your findings. Tell the reader why they should be concerned with the security issue identified. Using real world examples and consequences help to show the importance and severity of an issue.
  • Begin your assignment by identifying the types and versions of software installed and the way in which they have been configured. Use the Internet to search for and discover pre-existing issues with the operating system, software and configuration you have discovered.
  • Think outside the box. What would an end-user's computer require for it to be considered secure and how does this compare to the supplied VM?

Around 2000 words and above 10 Referencing Style APA.

Attachment:- Template.rar

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: What are the computer security issues in the virtual
Reference No:- TGS01561274

Expected delivery within 24 Hours