1,343
17
Research Paper, 2 pages (400 words)

Research paper on virtual machine security

Virtual Machine Security

Virtual machines represent completely isolated guest operating system installations in normal host operating systems (Griffin, 2006). Today they are implemented with the help of either hardware virtualization or software emulation. Often these two ways are combined so as to achieve more effective results. Although it is convenient to use such machines in different circumstances, there are certain issues with them in the field of security and some other areas (Kusnetzky, 2009; Whitehouse, 2011). In this paper I will describe one of the major security problems with virtual machine security, which is data protection in transit and storage.
The same problem of data protection exists in the case of physical machines as well, and VMs partly share the same issues, but also have the ones specific only for them (Araujo, & Hau, 2008; Double-Take, 2006). Some of the typical solutions work for the virtual environment and can be successfully used in it. Among them there are encryption, hashing and special protocols, such as SSL. When setting up the VMs, it is important to bear in mind that there may be required to enable more software components and services, than it was expected. In this case it is important not to miss the issue of protection and pay enough attention to it.
Among the issues that are unique for the virtualization area there is security of information that is stored directly on the host. The main problem is that typical virtual disk formats store the data in plain text, thus providing an easy way for attackers to access the information. Apart from this, virtual machines are more vulnerable to malware infections, as it is harder to find the origin of the problem and solve it (Garfinkel & Rosenblum, 2005; “ Virtualization Support,” 2008).
On the whole, in order to prevent these risks, it is important to come up with strong access controls and properly encrypt the most sensitive files. It is extremely important to take all the necessary measures to keep all the information and the machines themselves secure, as only in this way it will be reasonable to use them.

References

Araujo, R. & Hau, W. (2008). Going Virtual Requires the Right Technology. Retrieved from http://www. softwaremag. com/focus-areas/security/featured-articles/going-virtual-requires-the-right-technology/
Double-Take. (2006). Virtual System Protection. Retrieved from http://www. sunbeltsoftware. com/documents/virtual-system-protection. pdf
Garfinkel, T. & Rosenblum, M. (2005). When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments. Retrieved from http://www. stanford. edu/~talg/papers/HOTOS05/virtual-harder-hotos05. pdf
Griffin. (2006, August 16). Virtual Machines: Virtualization vs. Emulation [blog]. Retrieved from http://www. griffincaprio. com/blog/2006/08/virtual-machines-virtualization-vs-emulation. html
Kusnetzky, D. (2009, January 15). When is virtual machine technology the wrong choice? [blog]. Retrieved from http://www. zdnet. com/blog/virtualization/when-is-virtual-machine-technology-the-wrong-choice/638
Virtualization Support. (2008). Retrieved from http://www. ca. com/files/technicaldocuments/virtualization-support-tech-guide. pdf
Whitehouse L. (2011, August 5). VMware Backup Vendor Landscape [blog]. Retrieved from http://www. dataprotectionperspectives. com/2011/08/vmware_backup_vendor_landscape/

Thank's for Your Vote!
Research paper on virtual machine security. Page 1
Research paper on virtual machine security. Page 2
Research paper on virtual machine security. Page 3
Research paper on virtual machine security. Page 4

This work, titled "Research paper on virtual machine security" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Research Paper

References

AssignBuster. (2021) 'Research paper on virtual machine security'. 14 November.

Reference

AssignBuster. (2021, November 14). Research paper on virtual machine security. Retrieved from https://assignbuster.com/research-paper-on-virtual-machine-security/

References

AssignBuster. 2021. "Research paper on virtual machine security." November 14, 2021. https://assignbuster.com/research-paper-on-virtual-machine-security/.

1. AssignBuster. "Research paper on virtual machine security." November 14, 2021. https://assignbuster.com/research-paper-on-virtual-machine-security/.


Bibliography


AssignBuster. "Research paper on virtual machine security." November 14, 2021. https://assignbuster.com/research-paper-on-virtual-machine-security/.

Work Cited

"Research paper on virtual machine security." AssignBuster, 14 Nov. 2021, assignbuster.com/research-paper-on-virtual-machine-security/.

Get in Touch

Please, let us know if you have any ideas on improving Research paper on virtual machine security, or our service. We will be happy to hear what you think: [email protected]