Virtualization and Security
Virtualization
-
Definition:
- Running multiple virtual instances on a single physical hardware resource.
- Ensuring virtualized hardware infrastructure is secure and protected.
-
Operating System-Based Virtualization:
- Kernel enables isolated user-space instances.
- Virtualization software installed over a pre-existing operating system (host OS).
-
Major Operating System-Based Services:
- Backup and Recovery
- Security Management
- Integration to Directory Services
-
Operations:
- Utilize hardware capabilities (network connection, CPU).
- Interact with peripherals (webcam, printer, keyboard).
- Read/write data (files, folders, network shares).
-
Components of OS Virtualization:
- OS Virtualization Server: Manages streaming and client connections.
- Client: Connects to server and runs OS from virtual disk.
- Supporting components: Database, streaming service, TFTP service, PXE boot service.
-
Process:
- Connect to OS Virtualization server.
- Server checks client and assigns virtual disk.
- Virtual disk content is streamed to the client.
-
Features:
- Resource Isolation
- Lightweight
- Portability
- Scalability
- Security
- Reduced Overhead
- Easy Management
-
Advantages:
- Resource Efficiency
- High Scalability
- Easy Management
- Reduced Costs
- Faster Deployment
- Portability
-
Disadvantages:
- Security risks due to shared host OS.
- Limited Isolation
- Complexity
- Dependency Issues
- Limited Hardware Access
Security in Operating Systems
-
Steps to Ensure Virtual Security:
- Isolate and segregate assets.
- Harden and patch OS regularly.
- Monitor and audit continuously.
- Backup and recover data periodically.
- Educate and train staff and users.
- Use security tools designed for virtualized environments.
-
Types of Attacks on OS:
-
Active Attacks:
- Masquerade
- Modification of messages
- Repudiation
- Replay
- Denial-of-Service (DoS)
-
Passive Attacks:
- Monitoring communications
-
Malware:
- Spyware, ransomware, viruses, worms
-
Phishing:
- Forged communications to steal sensitive information
-
Man-in-the-Middle Attack (MITM):
- Intercepting and altering communications
-
Distributed Denial-of-Service (DDoS) Attack:
- Flooding server with simultaneous data requests
-
Zero-Day Exploit:
- Exploiting network vulnerabilities before patches are applied
-
-
Prevention Measures:
- Regular OS updates.
- Strong authentication methods.
- Use of reputable security software.
- Employ firewalls.
- Limit privileges and access rights.
- Continuous monitoring and penetration testing.