Book description
A step-by-step guide to identifying and defending against attacks on the virtual environment
As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts.
Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack
Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense
Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestations
Accompanying DVD includes hands-on examples and code
This how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats.
Note: The ebook version does not provide access to the companion files.
Table of contents
- Cover
- Chapter 1: Virtualized Environment Attacks
- Chapter 2: Attacking from the Outside
- Chapter 3: Making the Complex Simple
- Chapter 4: Denial of Service
- Chapter 5: Abusing the Hypervisor
- Chapter 6: Finding Leaks and Obtaining a Side Channel
- Chapter 7: Logging and Orchestration
- Chapter 8: Forcing an Interception
- Chapter 9: Abusing Software as a Service
- Chapter 10: Building Compliance into Virtual and Cloud Environments
- Appendix A: Building a Virtual Attack Test Lab
- Appendix B: About the Media
- Wiley Publishing, Inc.End-User License Agreement
- Introduction
- Download CD or DVD content
Product information
- Title: Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD
- Author(s):
- Release date: May 2012
- Publisher(s): Wiley
- ISBN: 9781118155486
You might also like
book
Internet Denial of Service: Attack and Defense Mechanisms
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets …
book
Dictionary of Information Security
The Dictionary of Information Security is a compilation of security terms and definitions that working security …
book
Asset Protection through Security Awareness
Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection …
book
Advanced Persistent Training : Take Your Security Awareness Program to the Next Level
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance …