Cumberlands How Virtualization May Create its Own Security Vulnerabilities Discussion

User Generated

xcnina

Computer Science

University of the Cumberlands

Description

Discuss, in your own words using 500 words or more, how virtualization may create it's own security vulnerabilities.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: "words you copied" (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.

Write in essay format not in bulleted, numbered or other list format.

Do not use attachments as a submission.

Reply to two classmates' posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not 'attaboys'. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due.

Explanation & Answer:
500 words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1

How Virtualization May Create its Own Security Vulnerabilities
Name
Institutional affiliations

2
How Virtualization May Create its Own Security Vulnerabilities
With virtualization, an individual or organization can run multiple processes
concurrently on a single computer or server (host). This has created convenience, lowered
operational costs, and enhanced flexibility (Brooks, Caicedo & Park, 2012). However, the
primary concern is the security of virtualization technology. A potential comprise whether
inside or outside could adversely affect the operation of the mission-critical functions.
Virtualization can be exposed to potential malicious insider activity. This becomes
increasingly dangerous if the individual(s) has privileged access to the virtual infrastructure.
Brooks, Caicedo & Park (2012, p. 265) affirm that "detecting malicious insider activity in
virtualization environments is a challenging task, which is further compounded if the ins...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags