Skip to main content

Virtualization Infrastructure and Related Security Issues

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Virtualization is a process through which one can create something that is there in effect and performance but in reality not there – that is virtual. It is a physical abstraction of the company computing resources like storage, network servers, and memory. VMware.com, a software developer and a global leader in the virtualization market, defines virtualization as a process in which software creates virtual machines (VMs) including a virtual machine monitor called “hypervisor,” which allocates hardware resources dynamically and transparently so that multiple operating systems, called “guest operating systems,” can run concurrently on a single physical computer without even knowing it [1]. For example, using software virtualization, one can, using the existing underlying hardware and software resources like operating systems, create and run several independent virtual operating systems on top of one physical operating system using the existing hardware resources to execute independent system tasks. Hardware virtualization also takes the same concept where several servers or client machines can be created based on one underlying hardware. The virtualization concept has been with us for some time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. VMware.com

    Google Scholar 

  2. Mullins, Robert. “Virtualization Tops CIO Priorities In 2012: IDC Savings from server consolidation will go to new IT innovations, IDC says”, InformationWeek January 11, 2012. http://www.informationweek.com/news/storage/virtualization/232400150.

  3. http://www.infobarrel.com/History_of_Virtualization#ixzz1l9armMAL.

  4. History of Virtualization. http://www.everythingvm.com/content/history-virtualization.

  5. Workstation Virtualization Featuring VMware Workstation 7.0/7.1. http://mv4t.com/Virtualization_VMware-Workstation.php.

  6. Wikipedia: http://en.wikipedia.org/wiki/Comparison_of_platform_virtual_machines.

  7. Wikipedia: http://en.wikipedia.org/wiki/Comparison_of_platform_virtual_machines.

  8. Gruman, Galen. “Virtualization’s secret security threats: Virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers”. InfoWorld, MARCH 13, 2008, http://www.infoworld.com/d/security-central/virtualizations-secret-security-threats-159?page=0,0.

  9. Shackleford, David., “An introduction to virtualization security”, SANS - Tuesday, 9 March 2010. http://www.net-security.org/article.php?id=1397&p=2 .

  10. MULLINS, ROBERT. “Virtualization Tops CIO Priorities In 2012: IDC Savings from server consolidation will go to new IT innovations, IDC says”, InformationWeek, January 11, 2012. http://www.informationweek.com/news/storage/virtualization/232400150.

  11. Wikipedia, http://en.wikipedia.org/wiki.

  12. Kartheek.”Virtualization Technology”. http://katireddykartheek.blogspot.com/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Migga Kizza .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Kizza, J.M. (2013). Virtualization Infrastructure and Related Security Issues. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4543-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4543-1_21

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4542-4

  • Online ISBN: 978-1-4471-4543-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics