From the course: Security Testing: Vulnerability Management with Nessus
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Virtualization vulnerabilities - Nessus Tutorial
From the course: Security Testing: Vulnerability Management with Nessus
Virtualization vulnerabilities
- [Teacher] Virtualization is a strategy commonly used to optimize the use of hardware in both on premises and cloud data centers. Virtualization technology allows multiple virtual hosts to run at the same time on a single hardware platform. One physical server may run dozens or hundreds of virtual servers, allowing all of those virtual hosts to share memory and processing power. From a security perspective, this means that we have to be extra careful to ensure that systems are isolated from each other. Virtualization platforms use a component called the hypervisor to restrict each virtual machine so that it can only access areas of memory reserved for its use. The hypervisor also prevents virtual machines from accessing memory belonging to other virtual hosts running on the same hardware platform. You might think of the hypervisor as the security guard of the virtualized environment. This separation of access is especially important in a shared environment like the cloud, where many…
Contents
-
-
-
-
-
-
-
-
(Locked)
Server vulnerabilities5m 18s
-
(Locked)
Endpoint vulnerabilities1m 44s
-
(Locked)
Network vulnerabilities4m 29s
-
(Locked)
Virtualization vulnerabilities2m 35s
-
(Locked)
Industrial control systems4m 36s
-
(Locked)
Understanding cross-site scripting5m 24s
-
(Locked)
Preventing SQL injection5m 29s
-
(Locked)
-