24 Virtual Machines and Cloud Computing
Gone are the days of the one-to-one relationship between a computer’s operating system (OS) software and its hardware. With virtualization, the underlying hardware platforms no longer matter to the OS, thanks to emulators that translate instructions from the software to the machine. In a virtual machine (VM), the OS (referred to as a “guest OS” when virtualized) and the software applications that it hosts run on virtual hardware.
This creates an interesting security challenge. Most security vulnerabilities that are at risk of exploitation originate from software. In a virtualized environment, everything is software—therefore, the risks are greater. Virtual machines carry their own security ...

Get Information Security: The Complete Reference, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.