SlideShare a Scribd company logo
Virtualization & SecurityConfrariaSecurity&IT, April 2009Bruno Morisson, CISSPInformation Security Professionalmorisson@genhex.orghttp://genhex.org/~mori/
60%
~# wget http://dilbert.com/
~# whatis Virtualizationa broad term that refers to the abstraction of computer resources
~# echo security+virtualization | bcSecurityVirtualizationVirtualizationSecuritySecurityThroughVirtualization
~# cat paradigmOperating SystemApp AApp XUser HUser WVirtualization Layer (HyperVisor/VMM)Hardware
~# shift paradigmOperating System AOperating System BOperating System ZApp AApp KApp DUser WUser VUser YVirtualization LayerHardware
~# headrisksNo physicalseparation;SeparationofDutiescompromised;ConfientialityandIntegrity ?Compliance?
~# head benefitsAvailability;Isolation of Users and Applications;Incident Recovery;Malware/Virus analysis;Forensics;
Securing a virtual system is not the same as securing a physical one. New threats, new vulnerabilities, new risks.~# tail virtualizationVirtualization is not panacea;We can benefit from virtualization, if we implement it after being well thought.
~# finger morisson@genhex.orgQ&ABruno Morissonmorisson@genhex.orghttp://genhex.org/~mori/http://www.linkedin.com/in/morisson

More Related Content

PDF
Is Security Optional20100608
aljapaco
 
PPTX
F5 Networks- Why Legacy Security Systems are Failing
Global Business Events
 
PPTX
What Happens At The Edge Of Your Network
Garland Technology
 
PPT
Network security
chauhankapil
 
PDF
Reputation System for Improving Security in VOIP
Association of Scientists, Developers and Faculties
 
PPTX
[SPS Lima 2017] Presentación Windows Defender Application Guard
jesusgonzales
 
PDF
Introduction to Cybersecurity-certificate - Cisco SIgn
Abdul Wahab
 
PDF
Defense Innovation Summit
OPSWAT
 
Is Security Optional20100608
aljapaco
 
F5 Networks- Why Legacy Security Systems are Failing
Global Business Events
 
What Happens At The Edge Of Your Network
Garland Technology
 
Network security
chauhankapil
 
Reputation System for Improving Security in VOIP
Association of Scientists, Developers and Faculties
 
[SPS Lima 2017] Presentación Windows Defender Application Guard
jesusgonzales
 
Introduction to Cybersecurity-certificate - Cisco SIgn
Abdul Wahab
 
Defense Innovation Summit
OPSWAT
 

Similar to Virtualization & Security (20)

PDF
BriefingsDirect Transcript--How security leverages virtualization to counter ...
Dana Gardner
 
PDF
An Architecture for Providing Security to Cloud Resources
Niranjana Padmanabhan
 
PDF
THE SIGNIFICANCE OF CYBERSECURITY
HilalHarris
 
PDF
Security_prediction_2014
Truong Minh Yen
 
PDF
Secure Remote Browser
Citrix
 
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
PDF
Enhancing your Cyber Skills through a Cyber Range
scoopnewsgroup
 
PPTX
Presentation1.pptx
PawachMetharattanara
 
PDF
Security in a Virtualised Computing
IOSR Journals
 
PPT
Trend Micro VForum Agentless Scanning Presentation
Graeme Wood
 
PPTX
Everything You Need to Know About BlueKeep
Ivanti
 
PDF
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
NowSecure
 
PDF
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Draup3
 
PDF
SecurePass at OpenBrighton
Giuseppe Paterno'
 
PDF
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL
 
PPTX
Data Centre Evolution: Securing Your Journey to the Cloud
Trend Micro (EMEA) Limited
 
PPTX
Security automation in virtual and cloud environments v2
rpark31
 
PDF
Insecure mag-19
Ambuj Sharma
 
PDF
Real-Time Protection From Every Malware Infection
Webroot
 
PDF
How to Audit
ayousif
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
Dana Gardner
 
An Architecture for Providing Security to Cloud Resources
Niranjana Padmanabhan
 
THE SIGNIFICANCE OF CYBERSECURITY
HilalHarris
 
Security_prediction_2014
Truong Minh Yen
 
Secure Remote Browser
Citrix
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Enhancing your Cyber Skills through a Cyber Range
scoopnewsgroup
 
Presentation1.pptx
PawachMetharattanara
 
Security in a Virtualised Computing
IOSR Journals
 
Trend Micro VForum Agentless Scanning Presentation
Graeme Wood
 
Everything You Need to Know About BlueKeep
Ivanti
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
NowSecure
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Draup3
 
SecurePass at OpenBrighton
Giuseppe Paterno'
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL
 
Data Centre Evolution: Securing Your Journey to the Cloud
Trend Micro (EMEA) Limited
 
Security automation in virtual and cloud environments v2
rpark31
 
Insecure mag-19
Ambuj Sharma
 
Real-Time Protection From Every Malware Infection
Webroot
 
How to Audit
ayousif
 
Ad

More from morisson (7)

PDF
Security asap
morisson
 
PDF
(Mis)trusting and (ab)using ssh
morisson
 
PDF
Mobile Securty - An Oxymoron?
morisson
 
PDF
APT
morisson
 
PDF
The Thing That Should Not Be
morisson
 
PDF
Honeypot Farms using Ethernet Bridging over a TCP Connection
morisson
 
PDF
Crash Course In Brain Surgery
morisson
 
Security asap
morisson
 
(Mis)trusting and (ab)using ssh
morisson
 
Mobile Securty - An Oxymoron?
morisson
 
The Thing That Should Not Be
morisson
 
Honeypot Farms using Ethernet Bridging over a TCP Connection
morisson
 
Crash Course In Brain Surgery
morisson
 
Ad

Recently uploaded (20)

PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
The Future of Artificial Intelligence (AI)
Mukul
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 

Virtualization & Security