Skip to content
Menu
Shark College
Shark College
security evaluation

security evaluation

January 4, 2022 by B3ln4iNmum

CO4509 – Computer Security
Assignment 2
Martin Bateman
[email protected]
April 28, 2020
Due date: 31st May 2020 11:59pm
Weighting: 50%
Size: 12 pages, 3000 words
Assignment Description
WidgetsInc has contracted Benny Vandergast Inc to develop their new webbased store. Benny Vandergast Inc has provided a VMware virtual machine for
testing. WidgetsInc have decided to give you the job of evaluating the security
of the system provided by Benny Vandergast Inc.
You should perform a security evaluation on the provided virtual machine
image. You have not been supplied with either the IP address of the system or
any usernames and passwords, you have have to discover these as part of your
investigation.
Requirements
Your report should include:
• A description of how you investigated the security of the system.
– include fully cited information on tools and techniques you used.
• A description of the results obtained.
• A proposal on how to secure the system.
– you should address each of the security issues you fnd.
1
Learning Outcomes
2. Propose and justify suitable security for a networked computer system.
3. Use a range of security-related tools.
4. Critically evaluate tools and techniques for system security.
6. Research and report on a security-related topic, using appropriate
literature.
Submission
The assignment work should be submitted as a Word document or Portable
Document Format to the correct assignment slot on Blackboard1 before 11:59pm
on the 31st May 2020.
Late work
Late work must be submitted to Blackboard in the required assignment slot.
Penalties for late submission
Except where an extension of the hand-in deadline date has been agreed (using
extenuating circumstances forms), lateness penalties will be applied in accordance with University policy as shown in Table 12.
(Working) Days Late Penalty

up to 5 maximum mark 50%
more than 5 0%

AssignmentTutorOnline

Table 1: Late submission penalty
Extenuating circumstances
If you believe that you have circumstances that justify an extension of the
hand-in deadline for your assignment work, you should use the Extenuating
Circumstances procedure. Extensions (to a maximum of 10 working days) can
be granted when there are serious and exceptional factors outside of your control.
Everyday occurrences such as colds and hay fever do not normally qualify for
1http://portal.uclan.ac.uk/
2https://www.uclan.ac.uk/study_here/student-contract-taught-programmes.php
2
extensions. Where possible, requests for extensions should be made before the
submission date.
The University considers extenuating circumstances to be conditions that
signifcantly impact on your work. Normally these will cover more than one
module. Requests for consideration of extenuating circumstances in respect
of assignment work submission, should be made using the MyUCLan3. You
shoud speak to your Academic Advisor prior to submitting. Whilst extenuating
circumstances are being considered, you should inform relevant module leader,
and continue with the assignment.
Feedback
Feedback will be given to the class within 15 working days of the assignment
hand-in date. This may be done in the frst ffteen minutes of the lecture. This
will be followed by individual written feedback tying to the Learning Outcomes
listed in the assignment brief, together with any additional helpful feedback
such as areas for improvement and areas for improvement.
Plagiarism
The University uses an electronic plagiarism detection system where your work
could be uploaded, stored and cross-referenced against other material. You
should know that the software searches the WWW, an extensive collection of
reference material and work submitted by members of the same cohort to identify duplicates.
For detailed information on the procedures relating to plagiarism, please see
the current version of the University Academic Regulations4.
Reassessment and Revision
Reassessment in written examinations and coursework is at the discretion of
the Course Assessment Board and is dealt with strictly in accordance with
University policy and procedures. Revision classes for referrals will take place
during ’reassessment revision, appeals and guidance week’ as marked on the
academic calendar.
The mark for the reassessed component is subject to a maximum of 50%.
3http://myuclan.uclan.ac.uk/
4https://www.uclan.ac.uk/study_here/student-contract-taught-programmes.php
3
Assessment criteria

Fail (10) Pass (50) Merit (60) Distinction (70) 80 (80)
Investigation (30) Brief description. Investigation is superfcial.
Some security issues have
been identifed via the use of
automatic tools. Only inves
tigates one area of the sys
tem e.g. just web shop, OS
or the running services.
Investigation includes mul
tiple aspects (OS, services,
application etc). Or goes in
depth into a single aspect of
the system.
Good coverage across three
or more aspects (OS, ser
vices, application etc). Or
goes in depth into a two as
pects.
Excellent coverage across all
aspects of the system. Pass
words have been recovered
rather than overwritten.
Implications (30) Brief description. Poor or obvious implications
for each vulnerability found.
Or only some implications
are addressed or the impli
cations don’t match up with
the severity of the problem.
Limited description of the is
sue and the implications .
Either all aspect covered but
to a superfcial level or only
goes into detail of a few of
the issues found.
Good description of the is
sue and its implications. All
issues addresses.
Excellent description of the
issue and its implications.
Accurate and concise de
scription of each issue. Each
issue includes a description
of how to exploit the prob
lem.
Securing (30) Brief description doesn’t re
ally secure the system.
Poor or obvious way of
securing the system, e.g.
overall recommendation of
just frewall/patching rather
than the way of dealing with
each problem.
Limited description of how
to secure the issues found.
Good description of how
to secure the issues found.
Each identifed issues is ad
dressed.
Excellent description of
how to secure the problems
found.
Documentation(10) Very poor. For example not
referenced, doesn’t address
the question or very poor
spelling and grammar mak
ing it hard to understand.
Some items are referenced.
Poor grammar, spelling.
Referenced. Good spelling,
grammar. Layout is consis
tent and make sense.
Good quality documenta
tion. All items referenced,
fgures are labelled.
Excellent. Publishable qual
ity.

4

  • Assignment status: Already Solved By Our Experts
  • (USA, AUS, UK & CA PhD. Writers)
  • CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • FNS50615 Diploma of FINANCIAL PLANNINGFNSASICZ503 Provide
  • Unit Code/s & Name/s CHCLEG001 Work legally and ethicallyCluster
  • [In Process] 73400 – Assessment Tasks and InstructionsStudent
  • Use Carter’s taxonomy for computer crime to classify each of the preceding examples.
  • Which communication method(s) would be most effective for each of the following scenarios?

Recent Comments

  • A WordPress Commenter on Hello world!

Archives

  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021

Categories

  • Uncategorized

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
©2022 Shark College | Powered by WordPress and Superb Themes!