10 Pages
2384 Words
Introduction Of Computer Systems Infrastructure And Management Assignment
Get free written samples from subject experts and Assignment Writing in UK.
The overall research paper has been related to the infrastructure of computer systems as well as management. The infrastructure has been based on the configuration of virtual machines. In addition, a "Japanese Biotech company" has recently accrued several substitutes regarding virtual machines. All the resources regarding VM wire have been evaluated through this software. Apart from this, the operating system "Linux" has been employed to execute the outcomes. A critical; reflection based on the research paper has been described based on the research study. The major techniques that have been employed for securing reliable information through VM wire have been discussed properly.
Aims and objectives
The fundamental motto of this research study is the configuration of a virtual machine based on a Japanese company and solving all the required deliverables such as securing user accounts, setting up administrative, setting up as well as configuring the SSSh network based on the above scenario.
Research background
The circumstances of the research have been discussed in this section. In addition, the circumstances of the research have been elaborated based on the review of the entire scenario. The background is related to the system infrastructure as well as configuration. The system configuration is essential for detecting several server issues. As per the illustration of Geraldo Filhoet al. (2019), several organizations, as well as workstations, are contained a lot of data based on their working criteria. The working process has been maintained the process of securing data from outsiders which is harmful to the company. The "Japanese biotech company" has employed all the facilities for securing the network through the VM wire configuration. This configuration has been done through the creation of several user accounts based on the company. The company has confirmed that the user account has been created through the process of docer installation. Moreover, the company wants to research regarding the deployment of the "data management system". On the other hand, the SSH has been configured through the process of attacking ports.
The above figure shows the vulnerabilities that have been detected based on the criteria. In addition, the software Kali Linux that is a part of a virtual machine has been used for protecting the network. The blue marked area has been visualized the detected vulnerabilities, as well as the red marked area, has been shown the false positive rate. Moreover, four criteria have been mentioned such as "Acunetix", "Netsparker", "Web cruiser" as well as "CSR scanner".
Literature review
The literature review based on the above scenario has been discussed in this section. Moreover, the above scenario is reliable as per the taken substitutes from the journals. Apart from this, the configuration of "VM ware" has been related to the system that manages the actual process. In addition, the network scenario based on the "VM ware" has been mentioned as the "security root account" of several processes. In addition, the system has been included several work frames based on their security purpose. On the other hand, the findings of the inessential functions are related to the operational system. Moreover, these functions are not reliable for this purpose.
Virtual machine configuration
The presentation regarding the software virtual machine has been discussed in this section. Moreover, this is reliable software for demonstrating the overview of this technology. In addition, several criteria are given for the configuration of VM wire. The first criteria have been given for the description of root user account security. Moreover, an administrative user account has to be created based on the given scenario and several processes have been taken to set up the user account. Besides this, the configuration of the SSH server has been done to protect the network from outsiders. In addition, five people have been chosen based on the "biotech company". Further, the user accounts are created based on their role in the company.
Security of root account
The reliability of the root account based on the user has been elaborated on in this subpart. As per the view of Rodrigueset al. (2018), the root account has been configured through the utilization of several essential methods such as "resident operating system security", "hamstring unessential functionalities" and so on.
In addition, the security of the root account is essential to get the virtual machines, keep the visitor working frameworks fixed as well as secure the current circumstance similar to the user secure the actual machine. Think about incapacitating pointless usefulness, limiting the utilization of the virtual machine console, and following other accepted procedures.
Security of the visitor working system
In addition, the protection of the resident working framework has been discussed in this section based on the given scenario. Moreover, this application has been employed to elaborate the security of the visitor working process as well as ensure that it has utilized the latest version of the virtual machine. Moreover, the process is hostile to spyware and against keyloggers applications. In addition, proper documentation is required for generating the overall process that shows the actual overview to create a user account based on the software "virtual machine".
The utilization of Impair superfluous
In addition, the usefulness of the unessential function is discussed in this section. On the other hand, the unessential function is debilitated to limit possible places of assault. Moreover, a significant number of the elements that have been employed rarely are normally crippled. Eliminate superfluous equipment and impair specific elements, for example, having a visitor filesystem ("HGFS") or reordering between the virtual machine and a remote control center. Moreover, the hiding of the essential functions is visualized inside the software called "VMware".
Utilization of layouts and prearranged administration
Virtual machine formats empower the user to build the working framework. Apart from this, the framework can meet all the necessities based on the scenario, as well as to make another virtual machine with similar surroundings.
If the user has any desire to modify the settings of "virtual machine" after introductory sending, think about utilizing scripts that have been instanced, "PowerCLI". This documentation makes sense of how to perform assignments utilizing the "Graphical User Interface". Assume the utilizing scripts instead of the "user interface" to predict the user's current circumstances. Apart from this, the user can bunch virtual machines into organizers to advance prearranging.
For data on layouts, it has been visualized as Use Templates to Deploy “Virtual Machines”as well as the “vSphere” Virtual Machine Administration documentation. On the other hand,for data on “PowerCLI”, it has been visualized in the document of “Virtual machine”
Limit utilization of the virtual machine console
The virtual machine console gives the very capacity to a virtual machine that a screen on an actual server gives. Client’s works with admittance to a virtual machine console approach virtual machine power the board and to removable gadget availability controls. Subsequently, virtual machine console access could permit a noxious assault on a virtual machine.
UEFI security boot application
In addition, the “UEFI” security for rebooting application has been described through this sub part. The design of virtual machine can be modified for utilizing“UEFI” boot. For gaining the working framework upholds secure “Unified Extensible Framework” boot, the user can choose the relevant choice for the VMs for extra security. The above statement has been contained Enable or Disable “UEFI” Secure Boot for a Virtual Machine.
The configuration of the SSH server
The SSH server configuration has been discussed in this section. In addition, the SSH server can directly interact with the TCP port that has been used normally for checking the vulnerabilities of the network. This server can be able to receive as well as operate the connection that is generally transferred through the "TCP" port. On the other hand, it can check whether any kind of disruption occurs in the network during the transmission process. Moreover, this server can solve all these issues concerning the port. For example, t6he port "80 TCP" has been employed for checking the vulnerabilities through the SQL injection attack. This server can manage to recognize the port and solve the bugs that have been generated through the network. Apart from this,Abraham et al. (2019), has been narrated that an inbuilt port is commonly used through the SSH server called "22 TCP". The port "22 TCP" is commonly known as the by default port to check the vulnerabilities. This server can solve the issue of unauthorized hackers that has been trying to detect the system. The configuration has been processed through the employed software that has been mentioned in the above section. Moreover, the code has been written in the command prompt through the OS Linux that is written as "open configuration". In addition, the pot "33011 TCP" can be utilized as a substitute for "22 TCP". The port name has to be mentioned as a command line through the terminal.
The biotech company has been chosen five-person for creating the user account. In addition, several posts are contained through these people such as "CEO", "Lead scientist", "intern/ employee", "engineer", as well as media manager. The management has been processed through the employed posts that are required for the virtual machine configuration process. In addition, all the accounts are created based on their roles in the company. The company has been managed to produce the data storing system through the directory where the data can be stored securely. The security of this system has been managed to produce the configuration of "The SSH" server. The process has been mentioned through the collaboration of the code implementation process. The process
Critical reflection
The evaluation of critical reflection has been discussed in this section. In addition, the reflection of several essential tools that are employed for the system configuration has been discussed in this section. Moreover, the tools are commonly known as "VMware Fusion" as well as "vsphere in VM". In addition, these tools are commonly known as the key features of the virtual machine. The tool "VMware fusion" has been employed to increase the durability as well as the performance of the VM wire. The system has been used to solve all the essential configurations based on these reliable tools. These tools include several features such as decreasing the resolution of "MP4", the resolution of deep color, the visualization of network acceleration, and so on.
A lot of tools are contained through the software "VMware" such as "ISOS", "OS packages" as well as "OVT tool". The first tool has been employed as a package installer in the virtual machine. In addition, the "resident operating system" has been installed through the utilization of this tool. The tool has been employed in the configuration of several authentications. Apart from this, the "OS packages " have been employed for installing several open virtual machine tools. The tools are generally converted through the applied program. In addition, this tool can support several operating systems such as "windows", "Linux", "Unix" and so on. On the other hand, the term "OVT" is commonly known as "open VMware tool". In addition, The tools are commonly known as the configuration of the open port system. The system has generated the actual scenario based on the study. Moreover, the "OVT" can detect those ports that are genuinely opened the path for configuration. The path has generated the relevant scenario based on the operating system "Linux". The system has been founded in the port which is contained the bugs as well as malware.
Based on the scenario, the tools are employed to generate the process of network ambiguity. For example, tools are employed for several vulnerability attacks. In addition, the tool "Vsphere" has been employed for configuring the "SSH" server.
Conclusion
Based on the assignment, it can be concluded that the configuration of "VM ware" is essential for the security purpose of the system. In addition, the account creation of the user is enough durable for the further implementation process. On the other hand, the utilization of the "SSH" server based on the tool "sphere", has been managed to generate the actual outcomes. Further, converting all the repot structure through the software Linux has been executed in the brief scenario based on the research study. Moreover, the overall process is dependent on the server implementation process. In addition, this configuration has been maintained a secure as well as robust infrastructure that can help to store all the essential information based on the workstation.
References
Geraldo Filho, P.R., Villas, L.A., Gonçalves, V.P., Pessin, G., Loureiro, A.A. and Ueyama, J., 2019. Energy-efficient smart home systems: Infrastructure and decision-making process. Internet of Things, 5, pp.153-167.
Rodrigues, T.G., Suto, K., Nishiyama, H., Kato, N. and Temma, K., 2018. Cloudlets activation scheme for scalable mobile edge computing with transmission power control and virtual machine migration. IEEE Transactions on Computers, 67(9), pp.1287-1300.
Abraham, N.L., Archibald, A.T., Cresswell, P., Cusworth, S., Dalvi, M., Matthews, D., Wardle, S. and Whitehouse, S., 2018. Using a virtual machine environment for developing, testing, and training for the UM-UKCA composition-climate model, using Unified Model version 10.9 and above. Geoscientific Model Development, 11(9), pp.3647-3657.
Andrews, R., Hahn, D.A. and Bardas, A.G., 2020, June. Measuring the prevalence of the password authentication vulnerability in SSH. In ICC 2020-2020 IEEE International Conference on Communications (ICC) (pp. 1-7). IEEE.
Cao, P.M., Wu, Y., Banerjee, S.S., Azoff, J., Withers, A., Kalbarczyk, Z.T. and Iyer, R.K., 2019. {CAUDIT}: Continuous Auditing of {SSH} Servers To Mitigate {Brute-Force} Attacks. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) (pp. 667-682).