Ensuring the security of using virtualization to protect data on the example of a peer-to-peer decentralized network TheOoL.net
Virtual workspaces are often used in modern information systems. Due to its technical features, such as no direct access to hardware, access balancing, instant migration, and much more, this technology has proven itself well in the field of information security. However, the possibility of obtaining...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Virtual workspaces are often used in modern information systems. Due to its technical features, such as no direct access to hardware, access balancing, instant migration, and much more, this technology has proven itself well in the field of information security. However, the possibility of obtaining secret data from the virtual workspace by introducing malware (for example, spyware) on the user's host, as well as the vulnerabilities of the virtual spaces themselves, remain quite serious problems. Various internal regulations or technologies used to ensure an adequate level of security may not be effective enough. Using the approach to ensuring the security of virtual spaces in the TheOoL.net system as an example, the author examines the use of a number of technological features to close the vulnerabilities of such systems. |
---|---|
ISSN: | 0094-243X 1551-7616 |
DOI: | 10.1063/5.0127179 |