官术网_书友最值得收藏!

Introduction

Risk management, while outside the scope of this book, is a key foundation in the creation of a secure system. Proper risk assessment will not only identify what is being protected, the cost, and the criticality of those assets, but also identify the likelihood of the system or systems being breached. With the state of governance, compliance, and the growing requirement to notify customers of the security breach, it's more important than ever to create an auditable system based on well-defined security policies.

Not long ago, type I hypervisor systems, such as VMware ESX and Microsoft Hyper-V, were considered inferior for the task of running highly secure environments. The virtualization market has made substantial progress in the security space in a short span of time.

This chapter provides a brief overview and review of the risk and the associated components of risk pertaining to the virtualization environment. The ultimate goal is to determine the acceptable risk, which is the level of risk that a company is willing to take in order to conduct business.

主站蜘蛛池模板: 柘荣县| 仲巴县| 桐柏县| 湖北省| 白河县| 贺兰县| 黔西| 太仆寺旗| 多伦县| 酒泉市| 左贡县| 嵊州市| 徐水县| 顺昌县| 建瓯市| 庆云县| 吴旗县| 永顺县| 武宁县| 弥渡县| 石阡县| 大渡口区| 桂阳县| 油尖旺区| 东阳市| 阿克苏市| 新龙县| 望谟县| 嵩明县| 颍上县| 西安市| 石棉县| 那曲县| 尉犁县| 南澳县| 贺兰县| 自治县| 东安县| 启东市| 绥阳县| 莱阳市|