Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

The Scenario

An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual Storage. These servers will support the various software components including: load balancer, web server, application and database server. The cloud service provider is responsible for securing the infrastructure that supports the virtual machines, storage and network. However the tenant (i.e. the organization using the service) is responsible for securing the Operating System, and the components of their application. The task for this assignment is to secure these virtual servers.

Assignment Task

Computer security aims to ensure the confidentiality, integrity and availability of systems and information. Due to the wide-ranging environments and platforms that are in use, and the lack of security awareness by many users, security is a complex task. This has resulted in a high level of data breaches and financial loss to businesses from threats ranging from insider fraud through to organized cyber-crime.
This assignment requires you to provide security functionality for an Ubuntu operating system (OS). First, you are required to discuss appropriate tools and techniques for the provision of security for this OS. The level of security required (ensuring confidentiality, integrity and availability) is appropriate for the non-ecommerce systems in the above scenario (i.e. the servers supporting the organization's informational website). Second, you are to demonstrate the implementation of the tools and techniques identified by your research and introduced in the lab sessions to the Ubuntu 2* virtual machine (VM). Third, you will demonstrate that the levels of security required have been achieved by using employing appropriate tools and techniques to test and demonstrate the security of the Ubuntu 2 OS. Finally, you are to provide a number of recommendations to raise the level of security of this OS to meet the needs of a more secure environment for example to support the e-commerce requirements.

Details of Tasks

Part 1. Discussion of tools and techniques for securing a Linux Server.
You are required to write a report with references to papers in journals, conference proceedings, Web sites or books on securing computer systems for an SME user. This should focus on the Linux operating system and in particular Ubuntu. The level of security required is deemed to be ‘medium', i.e. the system supports the business informational website and ensures that confidentiality, integrity and availability of the OS is maintained. As a guide, an approximate word count for this section is 800 words.

Part 2. Demonstrate Securing an Ubuntu System.
Using the VirtualBox VM image Ubuntu 2*, implement the level of security as detailed in part 1. To demonstrate the tools and techniques used to make this system more secure than an ‘out-of-the-box' installation, this section should include appropriate screenshots and supporting text. As a guide, an approximate word count for this section is 500 words.

Part 3. Demonstration of security achieved.
Using tools introduced during lab sessions in this module and other appropriate techniques, demonstrate that the OS has been made more secure by undertaking part 2 above. This section should include appropriate screenshots and supporting text to support your assertions of security. As a guide, an approximate word count for this section is 500 words.

Part 4. Recommendations for making the system ‘harder'.
Recommend what tools and techniques you would employ to ‘harden' the security of the Ubuntu 2 image so that it could be used where a more secure environment is needed (for example for e-commerce). As a guide, an approximate word count for this section is 200 words and may be in bullet point style.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91607318

Have any Question?


Related Questions in Computer Engineering

Despite being noble gases xenon and radon actually form a

Despite being noble gases, xenon and radon actually form a small number of compounds. What is the partial pressure in atmospheres of radon in a mixture at STP composed of equal masses of xenon and radon?

What is the prupose of adding nahco3 solution to dissolve

What is the prupose of adding NaHCO3 solution to dissolve the crude products in refinning process (Chemistry)

A sequence of natural numbers a1 a2 an is said to be a

A sequence of natural numbers (a 1 , a 2 , ..., a n ) is said to be a degree sequence if there exists an undirected graph on n vertices {v 1 , v 2 , ..., v n } such that the degree of v i  is a i  for each i = 1, 2, ..., ...

It has been a bad day for the stock market and you have

It has been a bad day for the stock market and you have heard that only 30% of all stocks gained value. Suppose you have a portfolio of 10 securities and assume a binomial distribution for the number of your stocks that ...

A medical researcher is interested in determining whether a

A medical researcher is interested in determining whether a new medication for lung cancer is effective in a group of patients with early-stage disease. Explain what a Type I and Type II error would be in this study. (Be ...

Question high-performing teambullimagine that you are an

Question: "High-Performing Team" • Imagine that you are an agile coach. Outline a plan that sets the expectations for your team when beginning a project. Provide a rationale for your response. • Read the mini-case titled ...

Describe an ethical conundrum found in a magazine or

Describe an ethical conundrum found in a magazine or newspaper article, and please give your own thoughts. Give good citations, of course.

Question review ram flash memory magnetic and optical

Question : Review RAM, Flash Memory, Magnetic and Optical storage technologies concerning their placement in the usage hierarchy of contemporary computer systems. Include size, speed and cost considerations at each level ...

One of the issues in early virtualization use was slow

One of the issues in early virtualization use was slow performance due to translation of system commands. Which piece of computer hardware was revised to run hypervisors natively? Also There are three "families" of opera ...

Jeff decides to start saving some money from this upcoming

Jeff decides to start saving some money from this upcoming month onwards. He decides to save only $500 at first, but each month he will increase the amount invested by $100. He will do it for 60 months (including the fir ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As