Term
|
Definition
-a piece of software that’s able to manage all of the CPU, the networking, the security, and all of the other resources needed for a virtual machine -Manages virtual machines -separates operating systems, independent CPUs -runs on a single physical machine -may need specialized hardware -Keeps multiple virtual machines separated |
|
|
Term
|
Definition
-type of hypervisor doesn’t need a host-based operating system -loads onto bare metal. -embedded -native hypervisor |
|
|
Term
|
Definition
-A type of hypervisor that runs on a host operating system |
|
|
Term
Application cells/containers |
|
Definition
-Running an application in its own virtual resource environment -Does not require all of the different resources and capabilities of an operating system -App is contained within a cell, or container |
|
|
Term
|
Definition
-A formal process that requires detailed documentation when a virtual machine is created -Lists applications running on the VM |
|
|
Term
|
Definition
-A vulnerability that allows hacker to break out of virtual environment and control the host -Pwn2Own Competition |
|
|
Term
|
Definition
White box hacking contests are used to find vulnerabilities -Example pwn2own competition -March 2017 Microsoft Edge JavaScript vulnerability in the Edge Sandbox -VMware bug in VMware hypervisor to escape to the host. -WhiteBox hackers exposed vulnerabilities that were patched -Stay up to date with new versions |
|
|
Term
HIDS for VM Escape Attacks |
|
Definition
-customized host-based intrusion detection systems -cloud servers -catch VM escape events as/when they happen |
|
|
Term
|
Definition
-Accessible wherever internet is available -Can use existing infrastructure for authentication -Requires strong encryption for data at rest |
|
|
Term
Virtual Desktop Infrastructure |
|
Definition
-applications in the cloud or in a data center -running as little of the application as possible on the local device |
|
|
Term
|
Definition
-makes security a lot more centralized -data and applications are in the data center or in a centralized cloud infrastructure |
|
|
Term
Cloud Access Security Broker (CASB) |
|
Definition
-Organizational defined set of security policies -applied to cloud based applications to provide visibility -what cloud based applications are in use -who is using the applications -HIPAA and PCI complaint |
|
|
Term
|
Definition
|
|
Term
Security As A Service devices |
|
Definition
-Can sit in the cloud -Between cloud infrastructure and the rest of the internet so it -constantly monitor all the traffic -React to problems very quickly -One change in the cloud updates anti-virus, anti-malware, intrusion prevention signatures, or anything else |
|
|
Term
|
Definition
Cloud based tool for: -monitoring data security policy usage -Verification of security policy standards and usage -monitoring and identification of threats |
|
|