4.2 Summarize aspects of client-side virtualization. Flashcards
Segregation of virtual environments for security purposes. Appliances that are used to supplement security features of a network. Used to test suspicious files in a protected environment
Sandbox
Development of applications of network configuration. Used for new security devices, new applications, automation scripts, updates, security patches.
Test development
Comprised of models to implement applications to users
Server based applications- Applications runs on servers. Users recieve the application enivronment display through a remote client protocol. Ex remote desktop services and Citrix presentation server.
Client based application virtualization (application streaming). Target application is packaged and streamed to the client PC. Has its own application computing environment that is isolated from the client OS and other applications. Ex. Microsoft application virtualization.
Application virtualization
Organizations may use an application that only runs on a certain operating system. System is no longer supported by the vendor.
Legacy software/OS
Windows / macOS / Linux doesn’t do everything
–Each OS has strengths and weaknesses
Run different operating systems at the same time
–Move between each OS seamlessly
–No rebooting
Save time and resources
–One physical computer
Cross-platform virtualization
Describe Resource requirements
Hardware on machine must have enough memory, hard disk space, and processor capability to support the virtualization. You need the software to make virtualization possible.
Describe Security requirements
Apply most recent patches and keep systems up to date to keep hypervisor from being attacked. Ensure that all VMs are updated with patches for the OS and all applications. Each virtual server hosted on the physical server must be configured with its own security mechanisms. Mechanisms include antivirus and antimalware software and latest service packs and security updates for all the software on VM.