Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson focuses on the need for security over the virtualized environment. Virtualization allows logic isolation on multi-tenant servers and may also allow attackers to target relevant components in order to access resources. Virtualization is the very core of cloud computing and its security relies upon the security of the Hypervisor. There are two types of hypervisors: • Type I: run directly on the hardware with VM resources and significantly reduce attack surface. • Type II: runs on a host OS and is at a greater risk for vulnerabilities.