Virtualization for Effective Risk-Free Network Security Assessment
نویسندگان
چکیده
منابع مشابه
Effective Methodology for Security Risk Assessment of Computer Systems
Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodo...
متن کاملHow to Calculate Information Value for Effective Security Risk Assessment
The actual problem of information security (infosec) risk assessment is determining the value of information property or asset. This is particularly manifested through the use of quantitative methodology in which it is necessary to state the information value in quantitative sizes. The aim of this paper is to describe the evaluation possibilities of business information values, and the criteria...
متن کاملSecurity challenges with network functions virtualization
The advent of network functions virtualization (NFV) has revolutionized numerous network-based applications due to its several benefits such as flexibility, manageability, scalability, and security. By the software-based virtualization of network functions on a single infrastructure, NFV provides users with a framework that dynamically provisions various network services in a flexible manner. H...
متن کاملSecurity consideration for virtualization
Virtualization is not a new technology, but has recently experienced a resurgence of interest among industry and research. New products and technologies are emerging quickly, and are being deployed with little considerations to security concerns. It is vital to understand that virtualization does not improve security by default. Hence, any aspect of virtualization needs to undergo constant secu...
متن کاملSolution for Virtualization to Ensure Optimal Network Security Environment
The Internet became widely diffused once the Internet Protocol (IP) was defined in an Internet technical standard, Request for Comments (RFC). Meanwhile, security measures were left insufficiently discussed. Given this situation, intruders disguised as normal communication can relatively easily penetrate and disrupt Internet services. Their methods of attacks are becoming more sophisticated on ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Online and Biomedical Engineering (iJOE)
سال: 2014
ISSN: 2626-8493
DOI: 10.3991/ijoe.v10i5.3106