Verified Document

Securing Virtual Machines Term Paper

Virtualized Server Security Virtualized servers are faced with similar security concerns as their physical counterparts. The only difference is that virtualized servers have other threats that are specific to virtualized machines. Virtualization is a new technology, and with any new technology, there are new threats and security concerns that will accompany it. When compared to its physical counterparts, virtualized servers are more prone to threats because they are clustered. If one virtual server is attacked, the other virtual servers are most likely to be faced with the same attack. Some of the risks faced by the virtual server can be mitigated through effective and efficient planning.

Lack of information security team

The failure to involve the information security team in the initial planning and architecture stages would result in security threats to the virtualized servers. The organization could have a secure physical server and would be extending the capabilities of its physical server, but the failure to conduct, and effectively planning would make the virtualized server prone to attacks (Luo, Lin, Chen, Yang, & Chen, 2011). With a virtual server, there is a new layer of software that is added and this new layer should be closely analyzed to determine it would not leave the server vulnerable. A vulnerable virtual machine could lead to the attack of the other virtual machines on the same host. Attackers can gain access to the host machine by exploiting the memory space...

In case of an attack to the hypervisor, then all the virtual machines running on the host would be compromised. An organization should ensure that it does not just migrate its physical server to a virtual server before due diligence is conducted. There is need to consult and involve information security experts to ensure that the implementation is well planned and executed.
The virtualization layer is faced with other vulnerabilities that are yet to be discovered. Hackers have been targeting this layer in order to compromise the security of the virtual machine. An attack on this layer would compromise all the virtual servers, which makes it critical to the success of the implementation. The information security team would conduct an analysis and offer advice on the best way to implement and secure the virtual server. The analysis would include a plan to mitigate the potential risks that the virtual server would be faced with. Knowing the potential risks faced by the virtual machine would allow the organization to plan on how to mitigate the risks. It is virtually impossible to manage a risk that cannot be acknowledged and communicated. The security processes of the organization should be extended instead of buying more security.

Traditional threats

Virtual servers are still vulnerable to legacy viruses, malware infection, rootkits, key loggers, and Trojans (Jing, Hao, & Songlin, 2012). Like physical servers, the virtual machines should be guarded…

Sources used in this document:
References

Jing, F., Hao, W., & Songlin, B. (2012). Virtualization security issues in cloud computing. Telecommunications Science, 4, 135-140.

Luo, S., Lin, Z., Chen, X., Yang, Z., & Chen, J. (2011). Virtualization security for cloud computing service. Paper presented at the Cloud and Service Computing (CSC), 2011 International Conference on.

Pan, W., Zhang, Y., Yu, M., & Jing, J. (2012). Improving virtualization security by splitting hypervisor into smaller components Data and Applications Security and Privacy XXVI (pp. 298-313). Berlin, Heidelberg: Springer.
Cite this Document:
Copy Bibliography Citation

Related Documents

Virtual Private Network VPN Now
Words: 1051 Length: 4 Document Type: Term Paper

Centralized telesaving control Managing cost-effective use of dial links centrally may no longer be possible. Overhead VPN tunnels impose overhead for dial-in users: encryption algorithms may impact the performance of the user's system, there will be an increased protocol header overhead, authentication latency will increase, PPP and IP compression will perform poorly (compared to a direct link), and modem compression won't work at all. Support issues Replacing direct-dial links with VPN tunnels may produce some

Avington College Virtual Learning Center
Words: 1271 Length: 5 Document Type: Case Study

The teaching staffs are also to be linked to the system via a wireless network. However in order to facilitate efficient learning, the system is to be linked via a Virtual Private Network (VPN) through an internet link. This therefore demands that there exists an internet connection infrastructure which comprises of the necessary routers, switches, cables and an Internet Service Provider with a very high uptime. What results can

Protection in the Cloud
Words: 1377 Length: 4 Document Type: Case Study

Virtual Security Issues Many of the challenges in managing a virtualization security upgrade project revolves around the communication between members of an organization. The means or tools that communication efforts are based upon make no difference as long as there is a shared and accepted policy that is agreed upon between those who need to communicate. During times of transition, communication must remain in extra clear terms as the stress associated

IPV6 in Distributed Virtual Private
Words: 3653 Length: 10 Document Type: Term Paper

Very High - IPSec works at the protocol level, independent of applications, therefore scalability is best-in-class Comparing the technological and operational benefits specifically in the areas of client access options, access control, client-side security, installation, and client configuration highlights just how differentiated the IPv4-based IPSec vs. IPv6 -based SSL protocols are from each other. In analyzing these differences, Table 3: Comparing Technological and Operational benefits of IPv6-based SSL and IPv4-based IPSec

Building a Secure Workflow Management
Words: 11534 Length: 35 Document Type: Research Proposal

Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. 1.4. Lecture Survey. The predicted solution of the problems related to e-government administration depends on answering the following questions as brainstorming ideas to solve the problem and the features provided by the system

E-Iatrogenesis: Human-Machine Interface E-Iatrogenesis: Chapters
Words: 10355 Length: 30 Document Type: Capstone Project

, 2005). In addition, the workload on clinicians is often increased past the point of reasonable because it is too intrusive and time consuming to document patient encounters during clinic time (Grabenbauer, Skinner, and Windle, 2011). The amount of information that can accumulate in a patient's record from multiple sources can be daunting and lead to information overload. CDS alerts can be so common that clinicians begin to ignore them.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now