Virtualization Flashcards
Virutal Machine Types: a System Virtual Machine
replaces entire physical computer
a virtual machine that provides a complete system platform and supports the execution of a complete operating system. P.e. a windows virtual machine that you can run on a mac bc it´s virtual
Virtual Machine Types: a Processor Virtual Machine
Designed to only run a single process or application like a web browser
What is a hypervisor
Hypervisor: Type I vs. Type II
software that creates and runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing.
Type I:
There is no OS under the hypervisor
AKA: Bare Metal Hypervisor
Type II:
The hypervisor is above the host OS
VM: Container-Based
Application Containerization:
A single operating system kernel is shared across multiple virtual machines but each virtual machine receives its own user space for programs and data
Containerization allows for rapid and efficient deployment of distributed applications
Ex: Docker, Parallels Virtuozzo, OpenVZ
Virtual Machine attack: Escape
An attack that allows an attacker to break out of a normally isolated VM by interacting directly with the hypervisor
Elasticity allows for scaling up or down to meet user demands
Virtual machine attack: Data Remnants
you scale up server, don´t need old data anymore, delete files from VM but they are still on physical server which could be attacked from hacker
Virtual machine attack: Live Migration
When a VM is moved from one physical server to another over the network.
Hacker could get in between servers and do man in the middle attack
Securing VMs
Uses many of the same security measures as a physical server
Limit connectivity between the virtual machine and the host
Remove any unnecessary pieces of virtual hardware from the virtual machine
Using proper patch management
Virtualization Sprawl
Occurs when virtual machines are created, used, and deployed without proper management or oversight by the system admins
Fog & Fog Computing
Fog:
Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud. Like edge computing, fog computing brings the advantages and power of the cloud closer to where data is created and acted upon.
Fog computing:
Distributed cloud architecture - extends the cloud
Private data never leaves (maximizes security)
Long-term analysis can occur in the cloud (internet only when required)
Edge Computing
edge computing moves some portion of storage and compute resources out of the central data center and closer to the source of the data itself. Rather than transmitting raw data to a central data center for processing and analysis, that work is instead performed where the data is actually generated
Technology & data for IoT devices occur on the device themselves
No latency, no network requirement
Increased speed/performance
Data is processed where it is, not in the cloud