March 2022
Intermediate to advanced
291 pages
9h 1m
English
Darshana A. Naik, G. Shruthi, A. Ashwitha, and Pramod Sunagar
M. S. Ramaiah Institute of Technology
5.1 Introduction to Cloud Computing
5.2.3 Traditional Security Approaches to Virtualization
5.2.3.4 Hypervisor Vulnerabilities
5.2.3.5 Single Point of Failure
5.2.3.8 Cross-VM Side Channel Attack
5.2.3.9 Outdated SW Packages in VMs
5.2.4 Security Benefits Due to Virtualization