- 2
- 0
- 约6.37千字
- 约 9页
- 2017-03-09 发布于上海
- 举报
Virtual Machine approach to Security虚拟机的安全性
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA Virtual Machine and Virtual Infrastructure A virtual machine is a tightly isolated software container that can run its own operating systems and applications as if it were a physical computer. A virtual infrastructure lets you share your physical resources of multiple machines across your entire infrastructure. In a virtual Infrastructure, many virtual machines interact with each other, are created and destroyed dynamically and move from one physical hardware to another seamlessly. We call the physical system which provides virtualization as Host. Virtual Machine and its Operating system is called the guest. Properties of Virtual Infrastructure Decouples software environment from its underlying hardware infrastructure so one can aggregate multiple servers, storage infrastructure and networks into shared pools of resources. (Scaling, Mobility) Virtual Machines can be deployed on an ad hoc basis, and destroyed when their purpose is served. (Transience, Diversity) Virtual machines can be provisioned using a template, thus 100s of VMs can be spawned in a short time.(Scaling, Diversity, Lifecycle) State of the virtual machine (or a group of virtual machines) can be check-pointed and reverted whenever necessary.(Software Lifecycle, Data Lifetime) Resources in a virtual infrastructure can be scheduled dynamically for maintenance of part of the infrastructure. (Mobility) These properties of a Virtual Infrastructure makes it difficult to apply the traditional Computer security methods. Risks mentioned in Gartner Report on Virtualization Security Information Security Isnt Initially Involved in the Virtualization Projects A Compromise of the Virtualization Layer Could Result in the Compromise of All Hosted Workloads The Lack of Visibility and Controls on Internal Virtual Networks Created for VM-to-VM Communications Blinds Existing Security Policy Enforcement Mechanisms Workloads of
您可能关注的文档
- Using an Interactive JavaBased Environment to Facilitate使用交互式的基于java的环境来促进.ppt
- Using Cellular Automata and Influence Maps in Games利用元胞自动机及其在游戏中的影响.ppt
- Using Alice rferro用爱丽丝 rferro.ppt
- Using Chemistry in Medicine West Virginia University西弗吉尼亚大学医学化学.ppt
- Using Compression to Improve Chip Multiprocessor Performance利用压缩技术提高芯片多处理器性能.ppt
- Using Corpora to Teach Grammar Montclair State 使用语料库教语法蒙特克莱尔州立.ppt
- Using Color Well Georgia State University利用彩色乔治亚州立大学.ppt
- Using Data In the Classroom NASA在课堂上使用数据美国航空航天局.ppt
- Ushers syndrome An overview for professionals Working with引进人才工作综合征概述.ppt
- Using Data to Drive Instruction Easy Literacy使用数据驱动指令易于读写.ppt
- 小区绿化施工协议书.docx
- 墙面施工协议书.docx
- 1 古诗二首(课件)--2025-2026学年统编版语文二年级下册.pptx
- (2026春新版)部编版八年级道德与法治下册《3.1《公民基本权利》PPT课件.pptx
- (2026春新版)部编版八年级道德与法治下册《4.3《依法履行义务》PPT课件.pptx
- (2026春新版)部编版八年级道德与法治下册《6.2《按劳分配为主体、多种分配方式并存》PPT课件.pptx
- (2026春新版)部编版八年级道德与法治下册《6.1《公有制为主体、多种所有制经济共同发展》PPT课件.pptx
- 初三教学管理交流发言稿.docx
- 小学生课外阅读总结.docx
- 餐饮门店夜经济运营的社会责任报告(夜间贡献)撰写流程试题库及答案.doc
最近下载
- DLT5375-2018 火力发电厂可行性研究报告内容深度规定.pdf VIP
- (2026年春新版)人教版八年级生物下册全册教案.doc
- ISO 5173 2009 金属材料焊缝的破坏性试验—弯曲试验(中文版).pdf VIP
- (高清版)DB13(J)∕T 8555-2023 县城特色风貌设计标准.pdf VIP
- 高级政治经济学(蔡继明)6.分工体系与广义价值决定.ppt VIP
- 潍坊亚星新材料有限公司500吨年六氯环三磷腈和500吨年苄索氯铵项目环境影响报告书.pdf VIP
- 最新2026年时事政治题单招及答案(夺冠).docx VIP
- 学校1530安全教育记录(2026年春季期).docx
- [会计理论葛家澍pdf]葛家澍和他的会计时代.docx VIP
- 解读GB 6441-2025《生产安全事故分类与编码》.pptx
原创力文档

文档评论(0)