- VMware vSphere Security Cookbook
- Mike Greer
- 175字
- 2021-08-05 17:16:02
Introduction
Risk management, while outside the scope of this book, is a key foundation in the creation of a secure system. Proper risk assessment will not only identify what is being protected, the cost, and the criticality of those assets, but also identify the likelihood of the system or systems being breached. With the state of governance, compliance, and the growing requirement to notify customers of the security breach, it's more important than ever to create an auditable system based on well-defined security policies.
Not long ago, type I hypervisor systems, such as VMware ESX and Microsoft Hyper-V, were considered inferior for the task of running highly secure environments. The virtualization market has made substantial progress in the security space in a short span of time.
This chapter provides a brief overview and review of the risk and the associated components of risk pertaining to the virtualization environment. The ultimate goal is to determine the acceptable risk, which is the level of risk that a company is willing to take in order to conduct business.
- 網(wǎng)絡(luò)安全與管理
- 信息安全導(dǎo)論(在線實(shí)驗(yàn)+在線自測)
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實(shí)踐
- 黑客攻防技巧
- Testing and Securing Android Studio Applications
- 可信計(jì)算3.0工程初步(第二版)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- Instant Java Password and Authentication Security
- 軟件安全保障體系架構(gòu)
- 從實(shí)踐中學(xué)習(xí)密碼安全與防護(hù)
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 黑客攻防實(shí)戰(zhàn)從入門到精通
- 隱私計(jì)算:推進(jìn)數(shù)據(jù)“可用不可見”的關(guān)鍵技術(shù)
- Hands-On Artificial Intelligence for Cybersecurity
- 動(dòng)態(tài)賦能網(wǎng)絡(luò)空間防御