Limited-time discount for students! | Solutions starting at $6 each

virtual machine Security Assignment PDF

Added on - 17 Jun 2021

  • 16

    Pages

  • 4214

    Words

  • 64

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 16 pages
Security of the VMware virtual machineSecurity of the VMware virtual machineStudent NameUniversity NameDateWord count1|P a g e
Security of the VMware virtual machineContentsIntroduction.................................................................................................................................................2Investigation of the security of the system..................................................................................................3Tools and techniques used..........................................................................................................................5Results obtained..........................................................................................................................................7Proposal to secure the system....................................................................................................................9References.................................................................................................................................................132|P a g e
Security of the VMware virtual machineIntroductionVMware machine is an OS (operating system) and an application environment which is installedon unique software which modifies on dedicated hardware. End-user experience on the virtualmachines is the same as their experience on dedicated hardware. Virtualization has completelychanged the data center and is one of the basic technologies in cloud computing. Assuming thatmany companies are keen on resolving virtualization in their private and public clouds, the riskthat these companies face risks are the same as the physical server. VMware has set severalmajor vulnerabilities this year, which must be set to its full virtualization production line. InMay, VMware issued security education to let the customers know that their virtualizationproducts have five related vulnerabilities (HU et al., 2013). RPC commands include the first twovulnerabilities, where the guest can crash or activate a code on a host VMX process. Because ofthe third vulnerability, NFS communication can be identified by the problem of underwriting onmemory, so that the code can be activated without verification. Reading memory is the fourthand fifth variance of using virtual floppy drives and virtual SCSI controllers. All these problemsare resolved by installing the right security patches for each VMware product. This studyincludes the recommendations for WidgetsInc for the security of VMware virtual machine whichBenny Vandergast Inc has provided for testing.Investigation ofthe security of the systemVMware Machine is the most used hypervisor in the World Enterprise Data Center, but usuallydoes not implement its best practices, resulting in poor performance, downtime or exposure.During the investigation it has been evaluated that for best practice and security WidgetsInc willlearn how to evaluate vSphere infrastructure. There is a need to improve virtual machine CPU3|P a g e
Security of the VMware virtual machineand memory size correctly, protect WidgetsInc’s vSphere infrastructure for vSphere distributedsource scheduler (DRS), vMotion and VMware Virtual SAN (VSN), SDRS and HA bestpractices and how to prevent hacking. After this investigation WidgetsInc will be able to analyzeany vSphere infrastructure and will be able to immediately recognize what is inappropriate andknow how to configure it for optimal performance and security(Jendrosch, 2014). Virtualizationis a technology that uses logical environments to avoid hardware physical limitations. Recently,its scope has become widespread. Virtual machine can play the same role as the actual system,because, for a digital forensic, the user activity recorded in a virtual machine is an importantelement. If WidgetsInc is found on the host's path to a VMware workstation, then they shouldcheck the virtual machine and the host system. However, due to lack of understanding of virtualmachines, the investigation process is not yet clears(Pektas and Acarman, 2013). Furthermore, dueto structural features, it is difficult to check the image of a corrupt virtual machine. Therefore, itis necessary to understand and research the process of investigation and recovery methods on thevirtual machine. VMware machine is very safe and a senior national security organization hasattempted to implicate the VMware virtual machine for six months (Aswariza, Perdana andNegara, 2017). Finally, they came into force.VMware Infrastructure includes several of the many addressed security issues in variousways:Implement security policies with the VMware infrastructure LUN partition andLUN masking along with the San Secure method.Apply secure network features of VLAN tagging increases network security simplyby tagging as well as filtering the network traffic on VLAN. Layered network safety4|P a g e
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document