Ask Computer Engineering Expert

The Scenario

An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual Storage. These servers will support the various software components including: load balancer, web server, application and database server. The cloud service provider is responsible for securing the infrastructure that supports the virtual machines, storage and network. However the tenant (i.e. the organization using the service) is responsible for securing the Operating System, and the components of their application. The task for this assignment is to secure these virtual servers.

Assignment Task

Computer security aims to ensure the confidentiality, integrity and availability of systems and information. Due to the wide-ranging environments and platforms that are in use, and the lack of security awareness by many users, security is a complex task. This has resulted in a high level of data breaches and financial loss to businesses from threats ranging from insider fraud through to organized cyber-crime.
This assignment requires you to provide security functionality for an Ubuntu operating system (OS). First, you are required to discuss appropriate tools and techniques for the provision of security for this OS. The level of security required (ensuring confidentiality, integrity and availability) is appropriate for the non-ecommerce systems in the above scenario (i.e. the servers supporting the organization's informational website). Second, you are to demonstrate the implementation of the tools and techniques identified by your research and introduced in the lab sessions to the Ubuntu 2* virtual machine (VM). Third, you will demonstrate that the levels of security required have been achieved by using employing appropriate tools and techniques to test and demonstrate the security of the Ubuntu 2 OS. Finally, you are to provide a number of recommendations to raise the level of security of this OS to meet the needs of a more secure environment for example to support the e-commerce requirements.

Details of Tasks

Part 1. Discussion of tools and techniques for securing a Linux Server.

You are required to write a report with references to papers in journals, conference proceedings, Web sites or books on securing computer systems for an SME user. This should focus on the Linux operating system and in particular Ubuntu. The level of security required is deemed to be ‘medium', i.e. the system supports the business informational website and ensures that confidentiality, integrity and availability of the OS is maintained. As a guide, an approximate word count for this section is 800 words.

Part 2. Demonstrate Securing an Ubuntu System.

Using the VirtualBox VM image Ubuntu 2*, implement the level of security as detailed in part 1. To demonstrate the tools and techniques used to make this system more secure than an ‘out-of-the-box' installation, this section should include appropriate screenshots and supporting text. As a guide, an approximate word count for this section is 500 words.

Part 3. Demonstration of security achieved.
Using tools introduced during lab sessions in this module and other appropriate techniques, demonstrate that the OS has been made more secure by undertaking part 2 above. This section should include appropriate screenshots and supporting text to support your assertions of security. As a guide, an approximate word count for this section is 500 words.

Part 4. Recommendations for making the system ‘harder'.
Recommend what tools and techniques you would employ to ‘harden' the security of the Ubuntu 2 image so that it could be used where a more secure environment is needed (for example for e-commerce). As a guide, an approximate word count for this section is 200 words and may be in bullet point style.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91607363

Have any Question?


Related Questions in Computer Engineering

Does bmw have a guided missile corporate culture and

Does BMW have a guided missile corporate culture, and incubator corporate culture, a family corporate culture, or an Eiffel tower corporate culture?

Rebecca borrows 10000 at 18 compounded annually she pays

Rebecca borrows $10,000 at 18% compounded annually. She pays off the loan over a 5-year period with annual payments, starting at year 1. Each successive payment is $700 greater than the previous payment. (a) How much was ...

Jeff decides to start saving some money from this upcoming

Jeff decides to start saving some money from this upcoming month onwards. He decides to save only $500 at first, but each month he will increase the amount invested by $100. He will do it for 60 months (including the fir ...

Suppose you make 30 annual investments in a fund that pays

Suppose you make 30 annual investments in a fund that pays 6% compounded annually. If your first deposit is $7,500 and each successive deposit is 6% greater than the preceding deposit, how much will be in the fund immedi ...

Question -under what circumstances is it ethical if ever to

Question :- Under what circumstances is it ethical, if ever, to use consumer information in marketing research? Explain why you consider it ethical or unethical.

What are the differences between four types of economics

What are the differences between four types of economics evaluations and their differences with other two (budget impact analysis (BIA) and cost of illness (COI) studies)?

What type of economic system does norway have explain some

What type of economic system does Norway have? Explain some of the benefits of this system to the country and some of the drawbacks,

Among the who imf and wto which of these governmental

Among the WHO, IMF, and WTO, which of these governmental institutions do you feel has most profoundly shaped healthcare outcomes in low-income countries and why? Please support your reasons with examples and research/doc ...

A real estate developer will build two different types of

A real estate developer will build two different types of apartments in a residential area: one- bedroom apartments and two-bedroom apartments. In addition, the developer will build either a swimming pool or a tennis cou ...

Question what some of the reasons that evolutionary models

Question : What some of the reasons that evolutionary models are considered by many to be the best approach to software development. The response must be typed, single spaced, must be in times new roman font (size 12) an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As