Front cover image for Securing the virtual environment : how to defend the enterprise against attack

Securing the virtual environment : how to defend the enterprise against attack

Annotation A step-by-step guide to identifying and defending against attacks on the virtual environmentAs more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companionDVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attackDissects and exposes attacks targeted at the virtual environment and the steps necessary for defenseCovers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestationsAccompanyingDVD includes all the recipes plus valuable tools for penetration testingThis how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats
Print Book, English, ©2012
John Wiley, Indianapolis, ©2012
xxvi, 425 pages : illustrations ; 23 cm + 1 DVD-ROM (4 3/4 in.)
9781118155486, 9781118225974, 9781118239261, 9781118263952, 1118155483, 111822597X, 1118239261, 1118263952
794639796
Virtualized Environment Attacks
Attacking from the Outside
Making the Complex Simple
Denial of Service
Abusing the Hypervisor
Finding Leaks and Obtaining a Side Channel
Logging and Orchestration
Forcing an Interception
Abusing Software as a Service
Building Compliance into Virtual and Cloud Environments
Appendix A Building a Virtual Attack Test Lab
Appendix B About the Media