Introduction
Virtualization has become an essential service that the IT department has offered to Access strategies internal users as a service. The result of this initiative has been a cost saving. As a result of the success, the company has mandated this approach to be adopted for our remote offices. However, our business need for expansion has resulted in the need for adopting new security strategies to protect our virtual infrastructure. These new requirements will require us to evaluate our current infrastructure for weakness and to implement policies, new products, or approaches to better serve our customers.
The Problem
Access Strategies virtual infrastructure was initially designed to account for simplified management and minimized administrative overhead. The design at the time was perfect for a small environment, but the company has recently expanded. A result of this expansion was the need to redesign the virtual environment was ordered to accommodate the new sites that would need virtual servers to power the infrastructure. This infrastructure was designed, but given recent events in where several companies were exposed because of security deficiencies. Upper management has order a review of the infrastructure to verify that no holes exist within the new infrastructure.
The Solution
Security weaknesses in any technology infrastructure are usually a result of poor design and implementation of any new technology. Identifying these threats takes precedents of being able to self evaluate your infrastructure and to review every piece of the design to verify that weaknesses are tolerable. This type of task should occur regularly and can be completed by performing a thorough research into the technology that you are lookin...
... middle of paper ...
... existing environment with the physical security present.
Works Cited
Hietala, J. D. (2009, August). Top Virtualization Security Mistakes (and How to Avoid Them). Retrieved from https://www.sans.org/reading-room/analysts-program/McAfee-Catbird-Virtualization-Jul09
Johnson, R. (2011). Security Policies and Implementation Issues. Sudbury, MA: Jones & Bartlett Learning.
Microsoft Corporation. (n.d.). Risk Management Discipline, Core Principles, and Components. Retrieved from Technet : http://technet.microsoft.com/en-us/library/cc526672.aspx
Pearce, M., Sherali, Z., & Hunt, R. (2013). Virtualization: Issues, Security Threats, and Solutions. ACM Computing Surveys, 45(2), 17-17:39. doi:10.1145/2431211.2431216
Tsai, H., Siebenhaar, M., Miede, A., Huang, Y., & Steinmetz, R. (2012). Threat as a Service? Virtualization's Impact on Cloud Security. IT Professional, 32-37.
The Operating System (OS) is the heart of computer server and client systems; therefore they are the pivotal components of the Information Technology (IT) architecture. The OS contains the crucial data, information, and applications, which are vulnerable, and can be infiltrated to cripple the entire IT architecture of the organization. Therefore, it becomes mandatory to properly safeguard the OS from an internal or external intrusion (Stallings & Brown, 2012). This critical thinking report will highlight the security concerns that may impact the OS. Further, the security guidelines and best practices for the OS in general, along with the specific fundamentals regarding the Windows and Linux OS are comprehensively illustrated.
Business ventures can benefit from virtual firewalls to protect access and data at lower costs than traditional methods. It is also beneficial to have an experienced security professional who is aware of your security needs. Virtual security involves the use of advanced controls such as a virtual switch to protect against malicious attacks coming from unverified sources. Applications are isolated to make them untouchable by malware, viruses and even applications that may stop execution (Marshall, 2011).
Virtualization of servers gives some security benefits. Running a server inside a hypervisor can restrict the effect of security breach, but server virtualization does not prevent attackers from trading off the server through vulnerabilities in the server application, the guest operating systems, or the host operating system. When different servers on the same host are virtualized, all can be affected by a single
There is constant concern about different kinds of devices and tools because of their vulnerability: laptops; personal computers in the home; libraries and public workstations; USB Flash Drives and email, to name a few. These items are easily accessible for those attempting to breach security.... ... middle of paper ... ...
What are the three or four most important drivers of Microsoft’s business model over the past 10 to 15 years that have accounted for the company’s spectacular results?
My purpose behind this brief history of virtualization was to inform you how virtualization became I have a proposal for you. I would like
Paisley. "The Impact of a Cyber War." Defense Tech RSS. N.p., 16 Jan. 2008. Web. 21 Nov. 2013. (Source H)
The virtual organization is a network of independent suppliers, customers, and even competitors, generally tied together by computer technology (Roger, 1991). They share skills, costs, and access to markets. It is tend to have flat structures in which information and decision making move horizontally (Judith R.G, 2002). Through the support of modern electronic system, it becomes possible to link people across formal organizational boundaries (Judith, 2002, quoted in S.G. Straus, S.P. Weisband, and J.M. Wilson, 1998).
Virtualization technologies provide isolation of operating systems from hardware. This separation enables hardware resource sharing. With virtualization, a system pretends to be two or more of the same system [23]. Most modern operating systems contain a simplified system of virtualization. Each running process is able to act as if it is the only thing running. The CPUs and memory are virtualized. If a process tries to consume all of the CPU, a modern operating system will pre-empt it and allow others their fair share. Similarly, a running process typically has its own virtual address space that the operating system maps to physical memory to give the process the illusion that it is the only user of RAM.
Microsoft (2013), Company information, mission, vision and strategy, available online at http://www.microsoft.com/about/companyinformation/ourbusinesses/business.mspx, retrieved on December 10, 2013
Over the past few years, Internet-enabled businesses, or e-businesses, have drastically improved efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote access allow companies to streamline processes, lower operating costs, and increase customer satisfaction. Such applications require mission-critical networks that accommodate voice, video, and data traffic, and these networks must be scalable to support increasing numbers of users and the need for greater data. capacity and performance of the system. However, as networks enable more and more applications and are available to more and more users, they become ever more vulnerable to a wider range of security threats.
Unequivocally speaking, the threat of a cyber-attack has become one of the most critical domestic and national security challenges we face as a nation today. Infrastructures supporting government operations are ...
Thomas, Teka. "Cyber defense: Who 's in charge?" National Defense July 2015: 21+. War and Terrorism Collection. Web. 28 Oct.
Conklin, W.A., White, G., & Williams, D. (2012). Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301) (3rd ed.). Retrieved from The University of Phoenix eBook Collection database.
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.