Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Virtual Environment Security-Considerations & Practices


Affiliations
1 School of Computer Studies (PG), RVS College of Arts and Science, Coimbatore, India
     

   Subscribe/Renew Journal


Virtualization is playing a vital role in various organizations by providing high flexibility to their environment. The users are getting tremendous benefits in terms of cost, utilization and efficiency. It promises to overcome the pitfalls in the traditional computing & provides the best solutions. Though Virtualization has many advantages over traditional computing, many organizations still have the dilemma to implement virtualization because of the security concerns. This paper provides the literature survey of virtualization, types of virtualization technologies and possible threats in virtual environment. We are providing a list of best practices and considerations which any organization must consider before implementing virtualization in their environment.

Keywords

Denial of Service, Hypervisor, State Restore, Threats, Virtual Machine.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 179

PDF Views: 2




  • Virtual Environment Security-Considerations & Practices

Abstract Views: 179  |  PDF Views: 2

Authors

S. Ranjitha Kumari
School of Computer Studies (PG), RVS College of Arts and Science, Coimbatore, India
V. Kathiresan
School of Computer Studies (PG), RVS College of Arts and Science, Coimbatore, India

Abstract


Virtualization is playing a vital role in various organizations by providing high flexibility to their environment. The users are getting tremendous benefits in terms of cost, utilization and efficiency. It promises to overcome the pitfalls in the traditional computing & provides the best solutions. Though Virtualization has many advantages over traditional computing, many organizations still have the dilemma to implement virtualization because of the security concerns. This paper provides the literature survey of virtualization, types of virtualization technologies and possible threats in virtual environment. We are providing a list of best practices and considerations which any organization must consider before implementing virtualization in their environment.

Keywords


Denial of Service, Hypervisor, State Restore, Threats, Virtual Machine.