Virtualization

.docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

505

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

7

Uploaded by AdmiralProton11467

Report
Virtualization Shakeya Outlaw-Knighton CSET, Grand Canyon University UNV-505: Cyber Warfare & Applications Jean-Pierre Nziga May 21 st , 2023
What is Virtualization? Chatterjee, Kumar, Le, & Nguyen (2018) define virtualization as the structure or approach of splitting the resources of a computer into many different execution environments. This is done by applying a single or supplementary idea or tech that is not limited to hardware and software division, time division, incomplete or finished machine imitation, high-quality service, etc. The Fundamental Concepts of Cyber Security The first fundamental concept of cyber security discipline is Network Security. Kumar & Kumar (2013) define network security as a complex field comprised of provisions and policies put in place to intercept and observe illicit access, abuse, alteration, or dismissal of a computer network and network-available means and ensure there is an opportunity in proper procedures. The second fundamental concept of cyber security discipline is Security Compliance. Security Compliance is defined as compliance with a particular group of security demands that include the demand on the application and layout of the virus scanners, firewalls, patching, penetration testing, and or other security procedures (Julisch, 2008). Julisch (2008) continues, these demands are introduced by regulators, customers, and senior management and they decide what needs to be completed to attain the security mandate. The final fundamental concept of cyber security discipline is Web Application Security. Web Application Security is defined as the method of safeguarding websites and online resources when it comes to security risks that abuse weaknesses within an application’s code (Hasson, 2023). When it comes to web applications being under attack, the applications that are
typically affected are management systems, database administration tools, and SaaS applications (Hasson, 2023). Fundamental Pillars in Cyber Security It is important to be well-versed in confidentiality when it comes to cybersecurity. Confidentiality within the cybersecurity realm is when data is not revealed to network organizations except for receiving proper authorization to acquire data. It is essential to know the next piece of the foundation of cyber security is integrity. Integrity in the cyber security realm is the quality of an organization that has not been altered in an unofficial method. Availability is the capability of being attainable and utilizable when needed by an approved organization. Non-Repudiation is the certainty that the dealer of data is supplied with evidence of delivery as well as the recipient is supplied with evidence of the dealer’s identification to avoid either party retracting the information. Authentication regarding cyber security is the ability to corroborate the identification or other characteristics alleged by an organization or to confirm where the information came from as well as the integrity that is attached alongside. Access is a security method that controls who or what is allowed to observe or utilize resources within the computing setting which can ultimately reduce dangers for the organization. Authorization is when a key is supplied to the individual after the individual has established their identification after the identification the individual is allowed to gain access to the information. Privacy in the world of cyber security is the authority to regulate how information is observed and utilized. Host and Guest Operating Systems & Hypervisors
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help