Virtualization for Security

Virtualization for Security
Author :
Publisher : Syngress
Total Pages : 384
Release :
ISBN-10 : 9780080879352
ISBN-13 : 0080879357
Rating : 4/5 (357 Downloads)

Book Synopsis Virtualization for Security by : John Hoopes

Download or read book Virtualization for Security written by John Hoopes and published by Syngress. This book was released on 2009-02-24 with total page 384 pages. Available in PDF, EPUB and Kindle. Book excerpt: One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting. Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. A recent report by IT research firm IDC predicts the virtualization services market will grow from $5.5 billion in 2006 to $11.7 billion in 2011. With this growth in adoption, becoming increasingly common even for small and midsize businesses, security is becoming a much more serious concern, both in terms of how to secure virtualization and how virtualization can serve critical security objectives. Titles exist and are on the way to fill the need for securing virtualization, but security professionals do not yet have a book outlining the many security applications of virtualization that will become increasingly important in their job requirements. This book is the first to fill that need, covering tactics such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems. About the Technologies A sandbox is an isolated environment created to run and test applications that might be a security risk. Recovering a compromised system is as easy as restarting the virtual machine to revert to the point before failure. Employing virtualization on actual production systems, rather than just test environments, yields similar benefits for disaster recovery and high availability. While traditional disaster recovery methods require time-consuming reinstallation of the operating system and applications before restoring data, backing up to a virtual machine makes the recovery process much easier, faster, and efficient. The virtual machine can be restored to same physical machine or an entirely different machine if the original machine has experienced irreparable hardware failure. Decreased downtime translates into higher availability of the system and increased productivity in the enterprise. Virtualization has been used for years in the field of forensic analysis, but new tools, techniques, and automation capabilities are making it an increasingly important tool. By means of virtualization, an investigator can create an exact working copy of a physical computer on another machine, including hidden or encrypted partitions, without altering any data, allowing complete access for analysis. The investigator can also take a live ?snapshot? to review or freeze the target computer at any point in time, before an attacker has a chance to cover his tracks or inflict further damage.


Virtualization for Security Related Books

Virtualization for Security
Language: en
Pages: 384
Authors: John Hoopes
Categories: Computers
Type: BOOK - Published: 2009-02-24 - Publisher: Syngress

DOWNLOAD EBOOK

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business
Virtualization Security
Language: en
Pages: 360
Authors: Dave Shackleford
Categories: Computers
Type: BOOK - Published: 2012-11-08 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors Virtualization changes the playing field when it comes to security. There are new at
Guide to Security for Full Virtualization Technologies
Language: en
Pages: 35
Authors: K. A. Scarfone
Categories:
Type: BOOK - Published: 2011 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to pro
Security in Network Functions Virtualization
Language: en
Pages: 272
Authors: Zonghua Zhang
Categories: Computers
Type: BOOK - Published: 2017-11-20 - Publisher: Elsevier

DOWNLOAD EBOOK

The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise
Virtualization Security
Language: en
Pages: 256
Authors: EC-Council
Categories: Computers
Type: BOOK - Published: 2010-06-23 - Publisher: Cengage Learning

DOWNLOAD EBOOK

The DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES is comprised of two books that are designed to fortify disaster recovery preparation and virtualization tec