Besides the virtual machines are easier to hack into via network links compared

Besides the virtual machines are easier to hack into

This preview shows page 4 - 5 out of 5 pages.

the fact that it is easier to move files and images among the virtual machines. Besides, the virtual machines are easier to hack into via network links compared to the physical machines (Roussey, 2017). Therefore, if there is an attack, there is minimal chance that some of the files or documents can be salvaged. It may, therefore, become difficult to rapidly bring back operations because the intensity of a cyber-attack may be huge. The other issue relates to the fact that the number of layers present in a virtualized environment is huge. Consequently, troubleshooting issues such as events, activity logs, and crashes can be very difficult. In the modern business environment, firms are keen to have seamless operations with very limited interruptions. Any time wasted through grounded operations leads to missed opportunities. Hence, it is imperative that virtual software tools are properly set up to ensure that all necessary information is captured and monitoring can be done appropriately. It is only through appropriate monitoring that weaknesses can quickly be picked up and addressed to have an uninterrupted flow of processes and transactions. References
Image of page 4
Roussey, B. (2017). Real Threats in Virtualised Environments: Identifying and Mitigating the Risks . Retrieved from Symantec. (2017). What Is Personally Identifiable Information (PII)? Retrieved from - information.html
Image of page 5

You've reached the end of your free preview.

Want to read all 5 pages?

  • Fall '07
  • McDevitt
  • Credit card, virtual machine, Social Security number, Personally identifiable information, Roussey

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture