logo

Computer Security of Virtual Machines

   

Added on  2021-05-31

13 Pages2683 Words119 Views
 | 
 | 
 | 
COMPUTER SECURITY
Computer Security of Virtual Machines_1

Table of Contents1.Introduction.......................................................................................................................................22. How to secure the system......................................................................................................................32.1 Security threats....................................................................................................................................32.2 Security systems of virtual machine...................................................................................................32.3 Virtual machine technologies..............................................................................................................42.4 Types of virtual machine.....................................................................................................................53. Investigation of the system security......................................................................................................63.1 Techniques...........................................................................................................................................63.2 Tools.....................................................................................................................................................64. Description of result..............................................................................................................................74.1 Investigation of finding the password................................................................................................8References............................................................................................................................................101
Computer Security of Virtual Machines_2

1.Introduction The system becomes safety using system security. Using system security we can avoidthe threat attacks. Confidentiality of the system, integrity to the system, and also systemavailability is provided by the system security. Three different types of components are usedsuch as hardware, software and data. Hardware means physical part of the computer memory,Software is an interface, operating systems and browsers are the types of software. If you wantto protect the Hardware and software components the only way is using security control(Yeo,2013).Two types of protections are available. One is technical and another one is physicalprotection, these two protections are used to protect the virus. The protection to theadministration is provided by the security control. Security system is used to access theinformation and it mainly used to avoid the threat and information loss and, many computersystems are protected by this way. Two security systems are used.Internet securitycomplete computer security Malware is the kind of security risk is used to protect the malware and viruses and itis a most popular security. The network security it is used to provide the solutions of the security problems, these problems fully based on the network security .The computer system is used to avoid the computer network problems. If you want to secure the network from the attackers then we need to follow some steps, like auditing method and another one is mapping method, it provide some additional details about the system structure, firewall, and also system devices. This system shows the information about network connections. Some important affect isauditing and it is used to develop performance, and provide best security system. The physical threats are used in the smaller network. But in the big network maps are used. The computers areconnected with a network so it affected by viruses and worms based on the operating system and the packages. Drivers use the latest version of anti-virus software to secure the password. VPN connection is used to secure the password setting and also reduce the traffic, not only the passwords the email is also be protected by this connection. We know that physical security system is a crucial work. The firewall internet use this crucial work to protect the system from viruses, and malware. The strong physical security like internet is used to protect the system 2
Computer Security of Virtual Machines_3

from the attacker or hacker. For example the wireless router use open Ethernet port. All the wireless routers are connected by the network. The good security plan is built by the internet, so no one can access your system without any authentication. So the hackers are eliminated by good security plan. So needed to build the strong security plan. For checking purpose two locks are used. In that one is door lock and another one is cabinet lock. Ethernet is disconnected by this task. The router configuration and physical switches are used for the security process.2. How to secure the system2.1 Security threats System threat make an affect in the way of quality of data or hardware damage, thenatural sources are used for create a threats. The risks are available in the system and it is knownas security threat, and stealing computer resources is also the type of threat. The essential data isstolen by the virus. Unauthorized access is also a kind of attack done by hackers. The data lossand damages are done by hackers in the physical security system. Three different types ofphysical threats are available such as internal threat, external and human threat. The internalthreats like files and hardware components are included .And the external threat is like the natureattacks are possible. In this way the human stealing is reduced. The non-physical threats are alsothe type of data loss and theft sensitive information. Anti-virus software is used to protect thesystem from the non-physical threats. All the viruses and Trojans are avoided by the additionalstorage (Inayatullah, 2013).Additional storage is known as to use pen drives or other devicessuch as hard disk, adapter, etc. Secured password is the only way to protect system. There aresome intruders are used in the security services. So the above two threats are used in the physicaland non-physical causes of data loss.2.2 Security systems of virtual machineIf you want to send the resources in secure manner the only way is we have to use thevirtual machine. Only one process is used for maintain the entire control of the virtual machine.And computers are makes the virtual machine by the usage of one process. The security system3
Computer Security of Virtual Machines_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Healthcare Networks: Architecture, Security Threats and Solutions
|7
|338
|124

Home Network Vulnerabilities
|5
|858
|297

Network Security Implementation
|20
|3861
|478

Assignment on Cyber Security 2022
|7
|712
|26

Assignment | Cyber Security
|23
|2174
|14

Computer Security: Definition, Goals, Threats, Challenges, and Risk Mitigation
|8
|213
|220