Nobody downloaded yet

Virtualisation and Security - Essay Example

Comments (0) Cite this document
Currently, expansion in the level of technology has facilitated computer users to cultivate virtual programs into their computers that look like real machine. Encroachment in information technology has led to increase in issues treated in a more zeal and interest than…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Virtualisation and Security
Read TextPreview

Extract of sample "Virtualisation and Security"

Download file to see previous pages It involves providing coherent operation process instead of physical computer view resources. Virtualization helps in facilitating many things possible since it allow computer users trick operating system to think that groups of servers operate like single pool. Virtualization can also allow running of multiple operating system in a single machine (Roemer, 2011, p. 2).
The intrinsic advantage linked to virtualization shows various threats attraction that limits unlimited use when such system operates in open platforms. Setting strategic threat prevention measures act as effective dealings for virtualized infrastructure. Subsequently, the paper explores domineering strategies of that effectively eliminate potential threats to virtualized infrastructures.
This classification of virtualization involves merging of physical storage system mainly obtained from multiple server networks storage located in the web. The merging of physical storage will make the device to appear as a single data storage device. It also creates more space in the device that increases the storage more information virtually (Grubor, Ivanis, 2012, p. 5).
Virtualization of server describes the process whereby the server hide physical resource from the system. The physical resources hidden from the server include operating system, resources from software running them to create more space for data storage. This process has effective nature since only the user can locate data storage location thus preventing unauthorized access. This protects data from malware and hacking. (Buttyan, Bencsath, 2013, 1).
This type of virtualization refers to amalgamation of network within the computing resources to form a single source. The process allows spilling of available bandwidth to form independent channels for data transmission within the network to allow faster data transfer. This independent channel also facilitates assigning of ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Virtualisation and Security Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Virtualisation and Security Essay Example | Topics and Well Written Essays - 2000 words. Retrieved from
(Virtualisation and Security Essay Example | Topics and Well Written Essays - 2000 Words)
Virtualisation and Security Essay Example | Topics and Well Written Essays - 2000 Words.
“Virtualisation and Security Essay Example | Topics and Well Written Essays - 2000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Virtualisation and Security

Issues of virtualisation and their impact on computing approaches

...? An investigation of the key characteristics of the implementation of virtualisation and its usefulness for future computation Amrik Singh Samra BSc. Information Technology Management for Business Keele University March 2011 Abstract Acknowledgements Table of contents Abstract 2 Acknowledgements 3 Table of contents 4 List of figures 6 List of tables 6 Specialist glossary and abbreviations 7 1 Introduction 9 1.1 Project background 9 1.2 Research objectives 10 1.3 Key considerations 10 1.3.1 Architectures 10 1.3.2 Management 10 1.3.3 Performance issues 10 1.3.4 Cost implications 11 1.3.5 Energy efficient computation 11 1.3.6 Security 11 1.4 Project method 11 1.5 Planning 11 1.5.1 Hardware and software...
32 Pages(8000 words)Dissertation


...Security The paper delves into the concept of online security which is indeed a very fundamental concern in the present world. In this regard, Google is heavily investing in a series of authentication through the use of two-step verification. There is a greater need to realize a stronger user security and device identification and limit much of the insecurity. The paper identifies some of the common security threats that face people online. However, it is realized that while people are reactive about aspects of online security, they only invest slightly to reduce this risk. This is majorly done through passwords without strong authentication. Some of the...
4 Pages(1000 words)Essay

Newcastle College- Virtualisation Technologies

..., Golden, 2013). Security: Virtualisation is very secure and can be checked from a centralized location. There is a set of guidelines which have to be met for a person to access the system. The compliance of the system can handle more than thirty hidden procedures which ensure maximum security of the system. The compliance procedures are automated and the system does not grant access if there any compliance procedures that were not met (Stewart, 2013). The security features are usually at the server, hardware and network levels making it almost impossible to be penetrated by any viruses or Trojans and hackers (Ciampa, 2008). Time saving: Staff of the New...
9 Pages(2250 words)Essay

E-Commerce and IT Security

... the further development of data centers across a specific area – under the terms that the energy needs of existing data centers are decreased (Wang, 2010, p.333). Virtualisation is another technological scheme that offers significant benefits to its users. The specific scheme allows to the user of a computer to run two different operational systems – simultaneously – allowing an important save in costs for servers; for this reason, the specific technology can be characterized as a valuable solution for firms that want to increase their system’s performance without reducing its safety. It should be noted that ‘virtualisation extends the battlefield (referring to the battle between the security services and the malware opponents... ) Marias,...
10 Pages(2500 words)Essay

Simulation of Server Virtualisation

.... To improve security and reduce server downtime: Usually when a server stops its service all the associated servers which are making use of these services will stop its function and application goes unavailable. But a virtualized server is separated from one another reducing the disadvantage of application downtime if any corruption or virus is attacked to one server. Virtualized servers are also not dependent on hardware. This means that when ever a system finds hardware failure, the virtualised server takes care of migration of resources to another server. This will keep the server function as usual. 2. Reduce cost of resources: As the business is concerned about the space, cooling capacity and the...
58 Pages(14500 words)Essay


...Security ID Introduction Security is of extreme importance to everyone and this has been identified as such in the everyday affairs in society. This importance is consistent with Maslow’s need hierarchy in which security represents one of the lower order needs that needs to be satisfied before others can be dealt with. It is therefore significant that security is assessed in different contexts. Events in medieval England that led to the creation of private watches and patrols In their examination of the origins and development of security in medieval England Fischer et al (2008) indicate that throughout history the concept of security can...
7 Pages(1750 words)Essay


...1 A New Technology Creates New Ethical Dilemmas Modern computer technologies are utilized for assembling, storing, operating, communicating information and for spreading data. Likewise, new technologies in the field of information technology (IT) are creating ethical dilemmas. The effectiveness and speediness related to the electronic information technology systems that consist of limited and international networks, databases and processing programs. These systems also force consumers to tackle new rights and responsibilities in order to use the data and re-evaluate principles of advent computers (Stahl 2011). 2 The Importance of Ethics in Information Systems Authority, source and control are the major resources... A New Technology...
6 Pages(1500 words)Essay


...simple words with numbers to make the passwords more secure. This will make it easier for them to key in the passwords into the system. Increasing the number of password attempts will also go along way in reducing the number of times that the system locks itself. Also finding other means to reboot the system when it locks itself will go along way in reducing the time that is spent looking for the manager to reboot the system. About the time spent rebooting the system, it would be better to upgrade the systems processors and virtual memory to enable it rebuilt in a matter of seconds. To avoid all these problems with passwords, it will be a good idea to incorporate a proximity key card and its reader to the system (refer...
5 Pages(1250 words)Case Study

Implement Virtualisation in staffordshire university security and privacy. The idea of handing important data over to another company causes concerns. Corporate executives could hesitate in embracing it because they have no control over their information. The counterargument to this is that companies that are offering these cloud computing services largely depend on their reputations and therefore putting security measures in place is in their best interest, otherwise they lose their clients (MULLER, 2005). The issue of privacy is also another concern. The ability for a client to log in from any location to access data and applications presents possibilities for the client’s privacy to be compromised. Cloud computing companies need to find ways of...
4 Pages(1000 words)Assignment


...Security Security I agree with the first and third claims made by the healthcare IT staff. The certification criteria used by HIPAAto justify and fund the shift from paper records to electronic ones is also essential. First, I agree that application-level data security is claimed to be sufficient for HITECH and HIPAA compliance. Application-level data security builds an all-inclusive security program. It is important for healthcare providers to consider and serve in terms of a holistic data security program that integrates security around patient information to hinder its access by unauthorized parties. HIPAA requires...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Virtualisation and Security for FREE!

Contact Us