Skip to main content

Virtualization Technology and Security

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Virtualization is a process through which one can create something that is there in effect and performance but in reality not there—that is, virtual. It is a physical abstraction of the company’s computing resources like storage, network servers, memory, and others. VMware.com, a software developer and a global leader in the virtualization market, defines virtualization as a process in which software creates virtual machines (VMs) including a virtual machine monitor called “hypervisor” that allocates hardware resources dynamically and transparently so that multiple operating systems, called “guest operating systems,” can run concurrently on a single physical computer without even knowing it [1]. For example, using software virtualization, one can, using the existing underlying hardware and software resources like operating systems, create and run several independent virtual operating systems on top of one physical operating system using the existing hardware resources to execute independent system tasks. Hardware virtualization also takes the same concept where several servers or client machines can be created based on one underlying hardware. The virtualization concept has been with us for sometime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. VMware.com

  2. Mullins R (2012) Virtualization tops CIO priorities in 2012: IDC savings from server consolidation will go to new IT innovations, IDC says, InformationWeek. January 11, 2012. http://www.informationweek.com/news/storage/virtualization/232400150

  3. http://www.infobarrel.com/History_of_Virtualization#ixzz1l9armMAL

  4. History of virtualization http://www.everythingvm.com/content/history-virtualization

  5. Workstation Virtualization Featuring VMware Workstation 7.0/7.1. http://mv4t.com/Virtualization_VMware-Workstation.php

  6. Wikipedia: http://en.wikipedia.org/wiki/Comparison_of_platform_virtual_machines)

  7. Gruman G (2008) Virtualization’s secret security threats: virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers. InfoWorld, March 13, 2008, http://www.infoworld.com/d/security-central/virtualizations-secret-security-threats-159?page=0,0

  8. Shackleford D (2010) An introduction to virtualization security, SANS – Tuesday, 9 March 2010. http://www.net-security.org/article.php?id=1397&p=2

  9. Wikipedia. http://en.wikipedia.org/wiki

  10. Kartheek. Virtualization technology. http://katireddykartheek.blogspot.com/

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Kizza, J.M. (2017). Virtualization Technology and Security. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-55606-2_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-55605-5

  • Online ISBN: 978-3-319-55606-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics