Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting (Paperback)
暫譯: 安全虛擬化:包含沙盒技術、災難恢復、高可用性、取證分析及蜜罐技術(平裝本)

John Hoopes

  • 出版商: Syngress Media
  • 出版日期: 2008-12-01
  • 定價: $1,980
  • 售價: 5.0$990
  • 語言: 英文
  • 頁數: 384
  • 裝訂: Paperback
  • ISBN: 1597493058
  • ISBN-13: 9781597493055
  • 相關分類: 資訊安全
  • 立即出貨 (庫存 < 3)

買這商品的人也買了...

相關主題

商品描述

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.

Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. A recent report by IT research firm IDC predicts the virtualization services market will grow from $5.5 billion in 2006 to $11.7 billion in 2011. With this growth in adoption, becoming increasingly common even for small and midsize businesses, security is becoming a much more serious concern, both in terms of how to secure virtualization and how virtualization can serve critical security objectives.

Titles exist and are on the way to fill the need for securing virtualization, but security professionals do not yet have a book outlining the many security applications of virtualization that will become increasingly important in their job requirements. This book is the first to fill that need, covering tactics such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems.

About the Technologies

A sandbox is an isolated environment created to run and test applications that might be a security risk. Recovering a compromised system is as easy as restarting the virtual machine to revert to the point before failure. Employing virtualization on actual production systems, rather than just test environments, yields similar benefits for disaster recovery and high availability. While traditional disaster recovery methods require time-consuming reinstallation of the operating system and applications before restoring data, backing up to a virtual machine makes the recovery process much easier, faster, and efficient. The virtual machine can be restored to same physical machine or an entirely different machine if the original machine has experienced irreparable hardware failure. Decreased downtime translates into higher availability of the system and increased productivity in the enterprise.

Virtualization has been used for years in the field of forensic analysis, but new tools, techniques, and automation capabilities are making it an increasingly important tool. By means of virtualization, an investigator can create an exact working copy of a physical computer on another machine, including hidden or encrypted partitions, without altering any data, allowing complete access for analysis. The investigator can also take a live ?snapshot? to review or freeze the target computer at any point in time, before an attacker has a chance to cover his tracks or inflict further damage.

A honeypot is a system that looks and acts like a production environment but is actually a monitored trap, deployed in a network with enough interesting data to attract hackers, but created to log their activity and keep them from causing damage to the actual production environment. A honeypot exposes new threats, tools, and techniques used by hackers before they can attack the real systems, which security managers patch based on the information gathered. Before virtualization became mainstream, setting up a machine or a whole network (a honeynet) for research purposes only was prohibitive in both cost and time management. Virtualization makes this technique more viable as a realistic approach for companies large and small.

* The first book to collect a comprehensive set of all virtualization security tools and strategies in a single volume
* Covers all major virtualization platforms, including market leader VMware, Xen, and Microsoft's Hyper-V virtualization platform, a new part of Windows Server 2008 releasing in June 2008
* Breadth of coverage appeals to a wide range of security professionals, including administrators, researchers, consultants, and forensic

商品描述(中文翻譯)

在過去幾年中,虛擬化成為資訊科技(IT)產業中最大的流行詞之一,並已成熟為許多最佳實踐商業場景的實際需求,成為各種規模公司的安全專業人員不可或缺的工具。除了節省時間和其他資源外,虛擬化還提供了前所未有的入侵和惡意軟體檢測、預防、恢復和分析手段。這本實用的書籍在一個被書籍服務不足的成長市場中,首次將虛擬化在增強安全性方面最重要和最受追捧的用途集中於一處,包括沙盒技術、災難恢復和高可用性、取證分析以及蜜罐技術。

根據Gartner的研究,虛擬化在實際使用中已經獲得了相當的關注和推廣,並以驚人的速度增長。該研究指出,虛擬化將成為未來四年內IT基礎設施和運營中最重要的趨勢。IT研究公司IDC最近的一份報告預測,虛擬化服務市場將從2006年的55億美元增長到2011年的117億美元。隨著這一採用增長,即使是中小型企業也越來越普遍,安全性成為一個更為嚴重的問題,無論是在如何保護虛擬化方面,還是虛擬化如何服務於關鍵的安全目標。

雖然已有書籍存在並且正在出版以滿足虛擬化安全的需求,但安全專業人員尚未擁有一本概述虛擬化的多種安全應用的書籍,而這些應用在他們的工作要求中將變得越來越重要。本書是第一本填補這一需求的書籍,涵蓋了如在桌面上隔離虛擬環境以進行應用測試、創建虛擬化存儲解決方案以實現即時災難恢復和網絡高可用性、將物理系統遷移到虛擬系統以進行分析,以及創建完整的虛擬系統以吸引駭客並揭露對實際生產系統的潛在威脅等策略。

關於技術

沙盒是一種隔離環境,用於運行和測試可能存在安全風險的應用程式。恢復被攻擊的系統就像重新啟動虛擬機器一樣簡單,可以恢復到故障之前的狀態。在實際生產系統上使用虛擬化,而不僅僅是測試環境,對於災難恢復和高可用性也能帶來類似的好處。傳統的災難恢復方法需要耗時的重新安裝操作系統和應用程式,然後再恢復數據,而備份到虛擬機器則使恢復過程變得更簡單、更快速和更高效。如果原始機器發生無法修復的硬體故障,虛擬機器可以恢復到同一台物理機器或完全不同的機器。減少的停機時間轉化為系統的更高可用性和企業的生產力提升。

虛擬化在取證分析領域已使用多年,但新的工具、技術和自動化能力使其成為越來越重要的工具。通過虛擬化,調查員可以在另一台機器上創建物理計算機的精確工作副本,包括隱藏或加密的分區,而不會更改任何數據,從而允許完全訪問以進行分析。調查員還可以拍攝實時“快照”,以在任何時刻查看或凍結目標計算機,防止攻擊者有機會掩蓋痕跡或造成進一步損害。

蜜罐是一種看起來和行為像生產環境的系統,但實際上是一個受監控的陷阱,部署在一個擁有足夠有趣數據的網絡中,以吸引駭客,但其目的是記錄他們的活動並防止他們對實際生產環境造成損害。蜜罐在駭客攻擊真實系統之前,揭示了新的威脅、工具和技術,安全管理人員根據收集的信息進行修補。在虛擬化成為主流之前,僅為研究目的設置一台機器或整個網絡(蜜網)在成本和時間管理上都是不可行的。虛擬化使這一技術成為大型和小型公司的現實可行方法。

* 第一部將所有虛擬化安全工具和策略的綜合集合收錄於單一卷冊的書籍
* 涵蓋所有主要虛擬化平台,包括市場領導者VMware、Xen和微軟的Hyper-V虛擬化平台,這是2008年6月發布的Windows Server 2008的新組件
* 廣泛的涵蓋面吸引了各類安全專業人員,包括管理員、研究人員、顧問和取證專家