Assignment Description
WidgetsInc has contracted Benny Vandergast Inc to develop their new webbased store. Benny Vandergast Inc has provided a VMware virtual machine for testing. WidgetsInc have decided to give you the job of evaluating the security of the system provided by Benny Vandergast Inc.
You should perform a security evaluation on the provided virtual machine image. You have not been supplied with either the IP address of the system or any usernames and passwords, you have have to discover these as part of your investigation.
Requirements
Your report should include:
• A description of how you investigated the security of the system.
– include fully cited information on tools and techniques you used.
• A description of the results obtained.
• A proposal on how to secure the system.
– you should address each of the security issues you find.
The University considers extenuating circumstances to be conditions that significantly impact on your work. Normally these will cover more than one module. Requests for consideration of extenuating circumstances in respect of assignment work submission, should be made using the MyUCLan3.
You shoud speak to your Academic Advisor prior to submitting. Whilst extenuating circumstances are being considered, you should inform relevant module leader, and continue with the assignment.
Feedback will be given to the class within 15 working days of the assignment hand-in date. This may be done in the first fifteen minutes of the lecture. This will be followed by individual written feedback tying to the Learning Outcomes listed in the assignment brief, together with any additional helpful feedback such as areas for improvement and areas for improvement.
The University uses an electronic plagiarism detection system where your work could be uploaded, stored and cross-referenced against other material. You should know that the software searches the WWW, an extensive collection of reference material and work submitted by members of the same cohort to identify duplicates. For detailed information on the procedures relating to plagiarism, please see the current version of the University Academic Regulations4.
Learning Outcomes
2. Propose and justify suitable security for a networked computer system.
3. Use a range of security-related tools.
4. Critically evaluate tools and techniques for system security.
6. Research and report on a security-related topic, using appropriate literature.
Submission The assignment work should be submitted as a Word document or Portable Document Format to the correct assignment slot on Blackboard1 before 11:59pm on the 31st May 2020.
Late work must be submitted to Blackboard in the required assignment slot.