Secure Testing Environment: Create a Virtual Cyber Security Sand Box
Virtualization creates a safe sandbox environment for you to experiment with the various security tools that will be utilized within the course in a safe manner. You will be able to describe the fundamentals of virtualization, compare and contrast the various virtualization architectures, enumerate and describe the various interfaces between the hypervisors, VMs, physical and virtual hardware, code execution and emulation, management tools, networking, storage, and external environments.
- Using GCU Virtualization Solution, located in the Course Materials, create an out of band Penetration Testing (PEN) environment that will include one attack platform and numerous target operating systems.
- Install and configure Vmware Workstation or Fusion on your desktop or laptop.
- Download a Kali VM. Refer to the Kali Linux website located in the Course Materials.
- Install Kali Linux in virtual environment.
- Select at least two vulnerable target operation systems from the Vulnhub website, located in the Course Materials (suggestions: OSs, Metasploitable 1, Metasploitable 2, Windows XP Service Pack 0, or Windows 7 Service Pack 0).
- All virtual machines should be configured on an isolated subnet (suggested subnet: 172.16.111.0/24)
- As you go, take instructional notes and screenshots to help reproduce your process.
In a 500- to 750-word essay research virtualization technologies, including Type I and II architectures, the technical mechanisms by which virtualization is implemented in a variety of environments, and their implications for cyber operations. Examine the following virtualization technologies and resource control principles:
- Memory management and isolation.
- Virtual storage allocation.
- Association of physical hardware with virtual hardware and device emulation.
- Live migration and failover of physical systems to virtual environment.
- Benefit of creating virtual snapshots and clones.
- Interfaces both internal and external for managing, monitoring, and synchronizing virtual environments.
Document the installation process in the “Lab Report Template.” Include individual IP addresses and host names for each virtual machine.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Course Materials if you need assistance.
Topic 1 DQ 1
What is the importance of using an isolated environment to perform penetration testing? What are the benefits of virtualizing this environment instead of using actual hardware? What effect does this have on your host system?
Topic 1 DQ 2
Research any virtualization technology. Discuss the security issues that may arise from using this technology in a corporate environment. For your chosen technology, which poses the greatest threat: virtual memory, storage, networking, etc.? How would you mitigate this risk?
Place your order now on a similar assignment and get fast, cheap and best quality work written by our expert level assignment writers.
ANSWERED!! Review and define the five (5) steps of strategic planning depicted in Exhibit 2-1 in the textbook on page 34. Based on the information, provide a statement of overall importance of these steps to your project team