Investigation And Mitigation Of Security Threats In A Virtual Machine: A Case Study