Abstract
Virtualization is a process through which one can create something that is there in effect and performance but in reality not there – that is virtual. It is a physical abstraction of the company computing resources like storage, network servers, and memory. VMware.com, a software developer and a global leader in the virtualization market, defines virtualization as a process in which software creates virtual machines (VMs) including a virtual machine monitor called “hypervisor,” which allocates hardware resources dynamically and transparently so that multiple operating systems, called “guest operating systems,” can run concurrently on a single physical computer without even knowing it [1]. For example, using software virtualization, one can, using the existing underlying hardware and software resources like operating systems, create and run several independent virtual operating systems on top of one physical operating system using the existing hardware resources to execute independent system tasks. Hardware virtualization also takes the same concept where several servers or client machines can be created based on one underlying hardware. The virtualization concept has been with us for some time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
VMware.com
Mullins, Robert. “Virtualization Tops CIO Priorities In 2012: IDC Savings from server consolidation will go to new IT innovations, IDC says”, InformationWeek January 11, 2012. http://www.informationweek.com/news/storage/virtualization/232400150.
http://www.infobarrel.com/History_of_Virtualization#ixzz1l9armMAL.
History of Virtualization. http://www.everythingvm.com/content/history-virtualization.
Workstation Virtualization Featuring VMware Workstation 7.0/7.1. http://mv4t.com/Virtualization_VMware-Workstation.php.
Wikipedia: http://en.wikipedia.org/wiki/Comparison_of_platform_virtual_machines.
Wikipedia: http://en.wikipedia.org/wiki/Comparison_of_platform_virtual_machines.
Gruman, Galen. “Virtualization’s secret security threats: Virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers”. InfoWorld, MARCH 13, 2008, http://www.infoworld.com/d/security-central/virtualizations-secret-security-threats-159?page=0,0.
Shackleford, David., “An introduction to virtualization security”, SANS - Tuesday, 9 March 2010. http://www.net-security.org/article.php?id=1397&p=2 .
MULLINS, ROBERT. “Virtualization Tops CIO Priorities In 2012: IDC Savings from server consolidation will go to new IT innovations, IDC says”, InformationWeek, January 11, 2012. http://www.informationweek.com/news/storage/virtualization/232400150.
Wikipedia, http://en.wikipedia.org/wiki.
Kartheek.”Virtualization Technology”. http://katireddykartheek.blogspot.com/.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Kizza, J.M. (2013). Virtualization Infrastructure and Related Security Issues. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4543-1_21
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4543-1_21
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4542-4
Online ISBN: 978-1-4471-4543-1
eBook Packages: Computer ScienceComputer Science (R0)