Computer Security

Your task is to assess the attack surface of this machine. The scope of your analysis is limited to: 
1. Network attacks (based on the image provided); 
2. Physical attacks (based on the description of the site). 
You should NOT login to the machine and analyse the individual software packages that have been installed. You only need identify and describe any vulnerable services from a network level (using suitable tools) and identify and describe any potential physical attacks given the scenario description above. 
It is not mandatory, but you may use a vulnerability scanner (e.g. Nessus) for the network level analysis. However, you are not allowed to simply copy and paste output of thesetools. Like in the real world you must synthesise the output of the (different) tools into a form appropriate for the audience and add textual descriptions.Your report should outline possible weaknesses and vulnerabilities. The report should startwith an executive summary of 1 page that summarises the most important findings and is understandable by a layperson. The following pages should describe the details and should be 
presented in a format suitable for a general technical audience – i.e. someone who is proficient in IT in general, but may not be a security expert. Citations should be used whereappropriate. 
Your report should enumerate all potential network accessible services with as much detail as possible (based on the viewpoint of an external attacker) and identify possible vulnerabilities for these services referencing specific CVE items (with brief explanations). An exhaustive list of CVEs is not required (there are too many), but you should at least discuss the 10 mostcritical and these must be relevant to the actual system and services. 
Your report should also discuss possible physical attack points and how these could be potentially exploited by attackers. 
Your report should end with a summary of the findings which is more in-depth than the executive summary and also clearly demonstrates a prioritisation of the most importantissues. Based on yourfindings you should also make recommendation on how to improve the security of the server as well as the physical security. 
Your report must have a title page and table of contents (ToC). It should be presented in aclear and concise way and should be written in your own words  



 Read less

Answer Detail

Get This Answer

Invite Tutor