Virtualization

Read Complete Research Material



Virtualization

Virtualization Techniques in the System Security

Introduction

In computing, virtualization is a way of hiding the physical characteristics of a computing platform from users, showing another virtual hardware, emulating one or more isolated environments. The concept of desktop virtualization is the same used in the virtualization of servers, or run multiple operating systems on a single physical device. One way is already widespread, although not use this same terminology is desktop virtualization through the use of terminal servers, wherein each user connected to the system has its session within a same operating system. The terminals are generally machines with more limited resources, since almost all the necessary processing is done on the server (Bernstein, 2007).

The basic application virtualization is simultaneously run multiple operating systems on a single server. Instead, many distributed machines, only partly using their capabilities have one, which dynamically allocates processing power needed, depending on changing needs. Cloud computing and VMware are also comes under the umbrella of virtualization technology. This reduce the number of computers can reduce costs by minimizing energy consumption and hardware and workload management. IT infrastructure is thus more flexible and dynamic.

In [Steven J. Vaughan-Nichols 2008], the author studies several virtual system security problems. He traces the virtual system history form security point of view and fined that the virtualization creates new security challenge for organization, and the administrator must ensure that every single virtualized system follows the rules and policies of the organization such as limiting access to some data and applications. An important example of new problem create by using virtualization is that the network-based security system don't usually trace the communication between two virtual machines installed on the same server. The author also presents the important of security zones to enhance the level of security for virtual systems. In security zones the host server divide the virtualized systems into zones, each zone has its security level depending on the virtualized systems requirements.

The big challenge that faces the organizations now is how to secure the virtualized system, which are vulnerable to the same type of threats as real systems. Virtualized systems cannot always be secured by the same technique as real systems, because each virtualized system on the same machine may face different threats and need different security levels, and we need additional security techniques to secure the channels between the virtualized systems on the same machine.

Virtualization Techniques in Security System

Virtualization of servers, desktops and applications is a solution that helps optimize costs through better use of resources. On average, a physical server is used only 5-15%. This means that more than 85% of the resource is not used in any way. Server virtualization allows us to increase the use of up to 60, 70 or even 80%. This provides significant savings on the cost of energy and cost savings resulting from the purchase of equipment.

At the same time operating systems and applications are no longer dependent on the equipment, so that you can easily manage, scale, depending on your needs, as well as ...
Related Ads