CHAPTER
24 Virtual Machines and Cloud Computing
 
Gone are the days of the one-to-one relationship between a computer’s operating system (OS) software and its hardware. With virtualization, the underlying hardware platforms no longer matter to the OS, thanks to emulators that translate instructions from the software to the machine. In a virtual machine (VM), the OS (referred to as a “guest OS” when virtualized) and the software applications that it hosts run on virtual hardware.
This creates an interesting security challenge. Most security vulnerabilities that are at risk of exploitation originate from software. In a virtualized environment, everything is software—therefore, the risks are greater. Virtual machines carry their own security ...

Get Information Security: The Complete Reference, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.