You are here: hacking technology > network management > Content
Hot Articles
Recommend Articles
New Articles
IDC virtualization technology development trend
  Add date: 11/23/2010   Publishing date: 11/23/2010   Hits: 125
Total 3 pages, Current page:1, Jump to page:
 

IDC virtualization trends:

In recent years, the rapid development of Internet, Internet Data Center for IDC (Internet Data Center) has contributed greatly to the development of promotion. But as IDC business development, zhuhai IDC facing hardware huge, maintenance cost, energy consumption and takes up the area high problem. And virtualization of development, make IDC in using virtualization, through virtual infrastructure integration data center within the physical systems, making a physical device can simultaneously carrying running a few sets even dozens of Taiwan logic operation system, greatly improving server hardware equipment utilization, make IDC in business constant development, but also effectively reduce the construction cost and operation cost. From the current IT technology development view, virtualization application will promote the further development of IDC business.

Virtualization in the environment security threats

IDC in parallel to business development, the security threat facing more and more severe. Large-scale attack flow seriously encroached on the export of bandwidth, direct reduced IDC overall service usable; Emerge in endlessly hacked into action, and to make each IDC managed within the host system face great safe hidden trouble, More seriously, IDC every internal server system to the outside of Internet access control relatively loose, once anti-hacker control a host system, can quickly spread to the whole IDC. Even some hackers will regard this as the springboard, using internal hosts and IDC exit bandwidth, directly to the IDC external network launch a larger attack, to interfere with the normal operation of the Internet.

After using the virtual technology in IDC, IDC within the server operating system between although in logic isolation state independent operation, but in safety protection, besides should deal with the original various security threat, such as viruses, worms, spyware, trojans, hacker attacks and intrusive etc, also consider IDC in virtual technology environment faced the new security threat:

1, once in the same physical host virtual machine server hackers control, will be immediately implanted backdoor, trojans, and other various malicious program, and unimpeded to this host others on the virtual server system diffusion. It can affect not only a host system business operation of IDC, still can make the IDC internal other virtual machine server onboth face very much of a threat.

2, hacked into IDC, will make use of virtual device manager software control physical host, including running after the virtual machine server also will be totally controlled by hackers, this will lead to IDC within the large service not available, confidential data loss function of fault, while hackers may still be along with the hijacked internal host to outside the Internet attack, produce various involves network security events.

4, IDC exist use frequency is not high, the virtual machine server security measures often not updating. Once restarted later, will become easy hackers target and all kinds of malicious software (such as viruses, worms, trojans, etc.) of propagation and diffusion object.

 

Other pages: : 1 * 2 * 3 * Next>>
Prev:BT4 Internet Settings skills Next:Korenix launches computer JetBox 9562 Router vehicle monitoring

Comment:

Category: Home > network management