![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Virtual Environment Security-Considerations & Practices
Subscribe/Renew Journal
Virtualization is playing a vital role in various organizations by providing high flexibility to their environment. The users are getting tremendous benefits in terms of cost, utilization and efficiency. It promises to overcome the pitfalls in the traditional computing & provides the best solutions. Though Virtualization has many advantages over traditional computing, many organizations still have the dilemma to implement virtualization because of the security concerns. This paper provides the literature survey of virtualization, types of virtualization technologies and possible threats in virtual environment. We are providing a list of best practices and considerations which any organization must consider before implementing virtualization in their environment.
Keywords
Denial of Service, Hypervisor, State Restore, Threats, Virtual Machine.
User
Subscription
Login to verify subscription
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 303
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 2