Skip to main content

All Questions

0votes
0answers
33views

secure deletion in virtual machines [duplicate]

when we securely delete a volume in a machine which is installed in a virtual machine or docker, for example by overwriting 7 times or more, we securely delete the data in virtual disk (in guest) and ...
alex's user avatar
2votes
1answer
210views

What are some attacks to consider in a cloud deployment? [duplicate]

I want to discuss the following scenario: I use a cloud provider like Amazon where every instance of the OS is a VM. The hypervisor launches the VMs as needed. So let's assume there are two VMs ...
SFlow's user avatar
0votes
2answers
870views

Privacy of client's virtual machine in cloud computing

As we know clients can create and run their virtual machines (VM)in the cloud computing. My question is about the confidentiality of data stored in the client's VM. Question 1: Does data stored in a ...
Aydin's user avatar
33votes
2answers
6kviews

How do big cloud providers guard against VM escape attacks?

I think it's pretty much unassailable to say that cloud computing as we know it depends on the concept of the robustness of virtual machines. Where one can depend on the security of VMs they allow ...
mostlyinformed's user avatar
1vote
1answer
129views

Virtulization in cloud and security

From a security perspective, which type of hyper-visor cloud is more secure - one that runs on bare-metal (using minimal boot strap build into hyper-visor) or one which is loaded as a part of the OS ...
Ijaz Ahmad's user avatar
1vote
0answers
219views

How do I reduce the vulnerability of the OpenStack SSH key generation process? [closed]

I found two places that describe OpenStack SSH keys, but nothing seems to say whether or not they're generated on VMs. Generating these on the VMs could lead to problems, since VM images are often ...
Nathan Basanese's user avatar
1vote
2answers
1kviews

OpenVPN and running other services on same server

What security implications should I know about/look for when running OpenVPN on the same server as my network cloud controller and apt-cache-ng? I plan on using the same server to run apt-cacher-ng ...
user2077362's user avatar
2votes
1answer
419views

Will two virtual machines running on the same physical host machine get the same value from /dev/random?

Will two virtual machines running on the same physical host machine get the same value from /dev/random if read over the same time period? Say that Virtual-machine-1 wants to generate its ssh host ...
Christian's user avatar
0votes
1answer
849views

Virtualization / Cloud-Stack fingerprinting from running VM

How can the host environment (not just the OS) be identified from a running guest VM. To determine what the underlying host and virtualization stacks being used actually are. I.e. whether there's a ...
binaryanomaly's user avatar
3votes
0answers
131views

What are the steps to securing encryption keys/databases on an unsecured DAAS provider?

Most Desktop As A Service providers store their virtual hard drives and the VMs RAM in a way that allows them to access their contents. Choosing a provider who offers a 'no-knowledge of server' ...
user2284570's user avatar
0votes
1answer
155views

Performance issues while applying encryption at host or guest level?

One of the security expert here suggested me to apply encryption at guest(virtual machine) level rather than applying at host level with good reason. Before applying that I want to know what can be ...
Tauqeer Ahmad's user avatar
0votes
1answer
719views

Which one is best, host or guest encryption?

Can anyone please tell me which option is better, I mean whether I should encrypt my data at virtual machine level or guest level in cloud? I tried to investigate it but did not find best solution so ...
Tauqeer Ahmad's user avatar
3votes
1answer
596views

How are IaaS Virtual Machines Isolated?

I am currently examining Hypervisor firewalls for my graduate thesis, but I unfortunately don't have a lot of experience with IaaS environments. How are IaaS Virtual Machines network isolated from ...
Phanto's user avatar
4votes
5answers
6kviews

Building a Security Training Simulation environment

My university is keen to build a security training simulation environment/platform and it will be a good learning experience for students. I Googled around to find out how it is built, but I only ...
Ken Adams's user avatar
4votes
1answer
2kviews

VPS Safety in the Cloud

Imagine you are running a web server on a Virtual Private Server (VPS) hosted in a datacenter. Could the people running the datacenter covertly read files from my VPS's hard disk? Could an attacker ...
dr jimbob's user avatar

153050per page
close