What Makes a Security Plan?

      Hello, and welcome back to my blog. This week, I would like to quickly discuss the levels that go into making a security plan. These types of plans are an important tool for IT departments and Cybersecurity Administrators to design a plan that will help protect or slow down an attack on the network.     Of course, security plans can vary from company to company; however, their purpose remains the same, with threats looming every day. With IT managers adjusting in response to the ever-changing threats, the created security plan must be designed to stop or slow down any attempt to breach network defenses. Below we will look at the principal components of a security plan and what they entail.    Separate Networks              As the name suggests, having more than one network can protect company assists from hackers and the like. The reason being is that having every computer on one network would lead to issues if that subsequent work were to fail, which would stop operati

Virtualization Overview

 Hello, and welcome to my blog!

 This week, we will discuss virtualization.

 But what is virtualization, and why is it used?  Well, virtualization is the process of running an operating system in an app window on your desktop that behaves like a physical computer.

 Another great feature of virtualization is the ability to run applications in a sandbox environment. Meaning, you can test applications in a safe place protected from interacting with your computer, or you can try different operating systems like Linux to see if it is right for you.

 There are different types of virtualizations, such as Hardware Virtualization, Desktop visualization, Application Virtualization, Memory Virtualization, and my favorite, Video Game Console Emulation.  Of course, there are many more types of virtualizations, but I will not be going over all of them today as this blog could take a long time explaining each one of them. I will be going over the ones I just mentioned in the best detail that I could.

 Hardware Virtualization

     This type of virtualization refers to creating a virtual machine that emulates like a real computer with an operating system. Applications on these types of virtual machines are separated from the hardware resources. This can be explained if a computer running Windows may host a VM that seems like a computer with a different operating system, such as Ubuntu Linux OS.

 Desktop Virtualization

     This is the idea of separating the logical desktop from the physical machine. Desktop Virtualization is often hosted on a remote central server, rather than a hard drive on a physical computer. Chances are you may have experienced a virtual desktop at work and did not notice.

 Application Virtualization

      Also known as process virtualization is a software technology that encapsulates computer programs from the operating system on which it is executed.

 Memory Virtualization

     In a data center, memory virtualization decouples volatile random-access memory or RAM from a computer system. It then aggerates those resources into a virtual memory pool, which is then available to any computer in a cluster or network. The collection of memory is then accessed by an operating system or application running on top of the operating system.

 Video Game Emulation

     It is a type of emulator that allows a computing device to emulate a video game console’s hardware. So, that game that you enjoyed playing back in the NES days can be played on your phone or tablet with an emulator.

Of course, there are many more types of VM out there, and a good portion of them are free to use, such as VirtualBox, VMware Player, and VMware Fusion, just to name a few.

So, is there a VM you like using? Have you had issues with them? If so, please leave a comment below!

 Until next time!

Comments

  1. I generally want quality content and I found that in your post. The information you have shared about virtualization is beneficial and significant for us. Keep sharing these kinds of articles here. Top Virtualization Training in Delaware

    ReplyDelete

Post a Comment

Popular posts from this blog

What Makes a Security Plan?

Outsourcing vs. Cloud Computing, a quick look

Public vs. Private Clouds: A quick look at the Pros and Cons