官术网_书友最值得收藏!

Introduction

Risk management, while outside the scope of this book, is a key foundation in the creation of a secure system. Proper risk assessment will not only identify what is being protected, the cost, and the criticality of those assets, but also identify the likelihood of the system or systems being breached. With the state of governance, compliance, and the growing requirement to notify customers of the security breach, it's more important than ever to create an auditable system based on well-defined security policies.

Not long ago, type I hypervisor systems, such as VMware ESX and Microsoft Hyper-V, were considered inferior for the task of running highly secure environments. The virtualization market has made substantial progress in the security space in a short span of time.

This chapter provides a brief overview and review of the risk and the associated components of risk pertaining to the virtualization environment. The ultimate goal is to determine the acceptable risk, which is the level of risk that a company is willing to take in order to conduct business.

主站蜘蛛池模板: 饶河县| 龙南县| 永吉县| 兴义市| 特克斯县| 和林格尔县| 宝清县| 达日县| 宁陕县| 荣昌县| 上犹县| 哈巴河县| 罗平县| 苏尼特右旗| 玉山县| 托克托县| 峨山| 老河口市| 尖扎县| 灵山县| 琼中| 荥阳市| 股票| 乐山市| 中西区| 唐河县| 白城市| 三穗县| 洞口县| 海晏县| 珲春市| 普宁市| 孝义市| 泰和县| 宜丰县| 从江县| 巴南区| 大荔县| 和田县| 女性| 思南县|