Thursday, September 17, 2015

Hypervisor and Visualization

What is the best reason why security researchers may choose to use virtual machines?

The best reason why security researchers use virtual machines is to offer an environment where malware might be executed but with minimal risk to the equipment. The virtual machine is isolated from the actual operating system, and the virtual machine can simply be deleted if it is affected by viruses or other types of malware.

The best reason is that it offers the isolated environment where a malicious activity can occur but be easily controlled and monitored.

Additional Learning

Most virtual machine software is designed specifically to host and be available to more than one VM. A byproduct is the intention that all VMs are able to communicate with each other quickly and efficiently. This concept is summed up by the term hypervisor . A hypervisor allows multiple virtual operating systems (guests) to run at the same time on a single computer. It is also known as a virtual machine manager (VMM). The term hypervisor is often used ambiguously.

Type 1: Native— The hypervisor runs directly on the host computer’s hardware. Because of this it is also known as “bare metal.”

Type 2: Hosted— This means that the hypervisor runs within (or “on top of”) the operating system.

Generally, Type 1 is a much faster and much more efficient solution than Type 2. It is also more elastic, meaning that environments using Type 1 hypervisors can usually respond to quickly changing business needs by adjusting the supply of resources as necessary. Because of this elasticity and efficiency, Type 1 hypervisors are the kind used by web-hosting companies and by companies that offer cloud computing solutions such as infrastructure as a service (IaaS).

Virtualization is a broad term that includes the use of virtual machines and the extraction of computer resources.

When a web script runs in its own environment for the express purpose of not interfering with other processes, it is known as running in a sandbox. Often, the sandbox will be used to create sample scripts before they are actually implemented.

Quarantining is a method used to isolate viruses.

A honeynet is a collection of servers used to attract hackers and isolate them in an area where they can do no damage.

No comments:

Post a Comment