Information Technology Reference
In-Depth Information
Figure 10.1 An example of the portability of virtual machines across multiple
hosting hardware options. Host operating systems may also vary, provided the
hypervisors are compatible across all hosts.
Virtualized Networks
Virtualization of networks beyond simple desktops and servers can afford
an enterprise with opportunities for modeling, testing, and defense.
Construction of a test network matching the full suite of applications
and services within a large enterprise can be a very costly matter, while a
complete virtualized network with identical configurations and settings
might be managed using only a single powerful host. Each virtual system
in the test network might have reduced processing power compared to its
production equivalent, but can be easily rolled back to a previous snap-
shot in the event of corruption or failure during test. Virtualized networks
can also be used for penetration testing without concern for disruption
of the production network, while “decoy” networks with automatically
generated traffic and network utilization can allow would-be network
attackers an environment in which their efforts are encapsulated and
recorded for later review of attacking methods. These decoy networks,
called honeynets , appear to be valid, active network environments but
Search WWH ::




Custom Search