IT.Auditing.Using.Controls.to.Protect.Information.Assets.2ndEd-2011 by Unknown

IT.Auditing.Using.Controls.to.Protect.Information.Assets.2ndEd-2011 by Unknown

Author:Unknown
Language: eng
Format: azw3
Published: 0101-01-01T00:00:00+00:00


IT Auditing: Using Controls to Protect Information Assets, Second Edition 280

Figure 11-1

Virtualization model

Virtualization software can be installed onto a bare metal server or as an application on top of another operating system. Many vendors allow the hypervisor to be installed either way, on top of the OS or by itself, without the hassle and overhead of the OS. The software is designed to utilize embedded processor instructions specifically designed to support multiple operating systems. Processor manufacturers led this charge a few years ago, and the highly customized hardware packages by Cisco Systems, VMware, and other global players foretell the intent to package as much power, security, and management as possible into the hardware to support virtual infrastructures. Gartner believes—

and the readers of this book will know—that by the time this book is published and distributed, more than 50 percent of the world’s servers will be virtualized.

Commercial and Open Source Projects

Several commercial players are in this market, including VMware, Microsoft, Citrix, Oracle, Parallels, Red Hat, and Novell. Some of these players maintain open source projects, including Xen by Citrix and VirtualBox by Oracle-Sun Microsystems. KVM is a popular open source virtualization project for Linux. Links to each of these projects are located in “Knowledge Base” at the end of the chapter.

Virtualization Auditing Essentials

To understand the material in this chapter, you need a basic understanding of the components that make up the virtualization environment. Your role as an auditor and



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(55286)
What's Done in Darkness by Kayla Perrin(26286)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(18811)
Shot Through the Heart by Mercy Celeste(18694)
The Fifty Shades Trilogy & Grey by E L James(18596)
The Subtle Art of Not Giving a F*ck by Mark Manson(13911)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(13857)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(12810)
Scorched Earth by Nick Kyme(12516)
Drei Generationen auf dem Jakobsweg by Stein Pia(10746)
Suna by Ziefle Pia(10677)
Scythe by Neal Shusterman(10032)
International Relations from the Global South; Worlds of Difference; First Edition by Arlene B. Tickner & Karen Smith(9289)
Successful Proposal Strategies for Small Businesses: Using Knowledge Management ot Win Govenment, Private Sector, and International Contracts 3rd Edition by Robert Frey(9106)
This is Going to Hurt by Adam Kay(8736)
Dirty Filthy Fix: A Fixed Trilogy Novella by Laurelin Paige(7359)
How to Make Love to a Negro Without Getting Tired by Dany LaFerrière(6759)
He Loves Me...KNOT by RC Boldt(6645)
Unleashing the Power of UX Analytics: Proven techniques and strategies for uncovering user insights [Team-IRA] [True PDF] by Jeff Hendrickson(6369)
Interdimensional Brothel by F4U(6093)