Virtualization techniques for Security

  • Thread starter Thread starter anes
  • Start date Start date
  • Tags Tags
    Security
AI Thread Summary
Virtualization techniques for security focus on isolating and protecting the hypervisor from external threats, often through the use of privileged management virtual machines. Another technique involves the recursive addition of virtualization layers, where commodity hypervisors run on top of specialized secure hypervisors. Additionally, hardware trusted platform modules (TPMs) play a crucial role in enhancing security by providing hardware-based security functions. Understanding these concepts is essential for implementing effective virtualization security measures. The discussion emphasizes the need for further explanation and resources on these techniques.
anes
Messages
22
Reaction score
0
Hi dear friends,
As part of our "Operating System" subject , i need a topic "Virtualization techniques for security".

Please provide its key points or any study resource , because i am out of college library now . Not any resource except NET . waiting your reply


Thanks
Anes
 
Physics news on Phys.org
Virtualization Security

Dear Friends,
I am looking for the topic "Virtualization techniques for Security" and got 3 points
1.Isolation and Protection of hypervisor from external entities
eg; Privileged management VMs
2. Recursive addition of additional virtualization layers
eg: by running commodity hypervisors on top of special "Secure" hypervisors
3. Through hardware trusted platform modules(TPMs)

I have not much idea abt these points . Do you can explain it

Thanks
Anes
 
Back
Top