You are on page 1of 1

This is a standard feedback and not feedback on the work you have submitted.

You are to use


this as a further guide for consideration. As this is a guide, the range of grade is 75% - 80%.
Adding less or adding more may or may not change the grade.

Frontpage included. Contents page included. Professionally laid out subheadings used are
appropriate and relevant. List of figures - extensive and relevant.

Introduction - A very good balance of content. Showing the key area of activity for the report
which is the web services and then the assignment requirements, operating systems and
networking defined and explained. The sections also outline the purpose of the report.

Background research - Features and functions, as per the assignment are discussed. Where
relevant, citations are used to support facts. File systems, user types and other relevant content
discussed and compared using appropriate facts. Coverage of security e.g. firewalls included.

Installation - Comparison of Windows and Linux installation – general information e.g. types of
users, GUI and features and functions and how the OS is intended to do the same thing.

Networking - Peer to peer and client server included. Packet Tracer used to illustrate the types of
networks. Protocols and services included. HTTP discussed. How HTTP service allows
communication using Ack and three-way handshake. HTTPS security for the website. OSI model
and TCP/IP model compared. Wireless networks mentioned and SSID and authentication - WEP.
WPA2-PSK as a stronger authentication included.

Mitigating Stack Overflow - Explained inline with server and languages.

VM Environment - Importance of virtualisation for the practical. Tools expected to be used stated.
Legislation of the experiment focus on the business scenario environment. DPA PECR
mentioned. Processes or legislation e.g. service level agreements, policies and Computer
Misuse Act considered when working on client machine.

Users added to the installed Ubuntu machine. Web server - apache2 installed and web page
displayed. System used to implement UFW, user access/permissions. encryption and updates.

Web server tools installed PHPMyAdmin, MySQL and PHP - practical and screen shots shown –
These are additional installations and screen prints show features. These installations are used
to further discuss security – i.e. the more apps the more scope for vulnerabilities

Server automation - Bash script for user creation.

Comparison of OS - Section is detailed and explanation uses screen shots to further explain.
Potential exploits - Kali Linux used to explore potential exploits with installed tools. Comparison
also consists of processes, file management, memory management of different OS used in the
practical

Conclusion - Conclusion draws on findings of the entire work, research and practical. Reflection
on the use of other distros mentioned. To test more OSs, more tools and more capacity may be
needed.

Recommendation - The entire research and practical results are used to recommend a viable
solution for organisation. Hardware recommendations drawn and software suitability supported
with evidence. Security reviewed and implemented security not taken as 100% secure.

Final comments – An excellent report, which documents the majority of the assignment
requirements using, in most cases, well written sections. Citations used well and in only a few
areas, more use of citations could have allowed further stretch of sections. A very good structure
for a functional report for organisation.

Note – use only as an example feedback for work within the range 75% to 80%

You might also like