对采用者常见的虚拟机配置错误的回顾:以坦桑尼亚为例

S. Ally, N. Jiwaji, C. Tarimo
{"title":"对采用者常见的虚拟机配置错误的回顾:以坦桑尼亚为例","authors":"S. Ally, N. Jiwaji, C. Tarimo","doi":"10.4314/HURIA.V25I2","DOIUrl":null,"url":null,"abstract":"Adoption and use of hypervisors and virtual machines have become heart of virtual server computing and are currently a primary choice to store and share data across different public and private sectors. However, one of the major security threats is on meager adopter’s knowledge on proper handling of hypervisor installation, VMs creation and configurations. This paper exposes distinct security vulnerabilities of virtualized systems that are caused by the adopters due to various system misconfigurations such as use of unified installer across virtual infrastructure, level of security enhancement in type 2 hypervisors, presence of untouched default settings in open source hypervisors, usage of vendor lock in VMs file formats, ad hoc creation of VMs and allocation of computing resources especially virtual CPU, RAM and HDD. Furthermore, undecided size of key Linux directories including /home directory, /boot directory, /var directory, root (/) directory, /temp directory and swap have also been assessed. To undertake this study, server configurations in 15 public and 9 private organizations were screened. A total of 31 purposively selected server administrators were interviewed guided by a checklist of questions in a semi-structured questionnaire. A quick observation obtained from the findings of this study suggests that server virtualization adopters operate at high security risks due to existence of uncoordinated and unsecured VMs configuration due to lack of required expertise. Lack of regular system auditing and monitoring turn the adopters into vulnerable and target of attack at any time without the adopter’s knowledge. The need for adopters to observe best practices towards adoption and use of virtualization software is vital.","PeriodicalId":327958,"journal":{"name":"Huria: Journal of the Open University of Tanzania","volume":"71 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Review of Adopter’s Common Misconfigurations of Virtual Machines: The Case of Tanzania\",\"authors\":\"S. Ally, N. Jiwaji, C. Tarimo\",\"doi\":\"10.4314/HURIA.V25I2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Adoption and use of hypervisors and virtual machines have become heart of virtual server computing and are currently a primary choice to store and share data across different public and private sectors. However, one of the major security threats is on meager adopter’s knowledge on proper handling of hypervisor installation, VMs creation and configurations. This paper exposes distinct security vulnerabilities of virtualized systems that are caused by the adopters due to various system misconfigurations such as use of unified installer across virtual infrastructure, level of security enhancement in type 2 hypervisors, presence of untouched default settings in open source hypervisors, usage of vendor lock in VMs file formats, ad hoc creation of VMs and allocation of computing resources especially virtual CPU, RAM and HDD. Furthermore, undecided size of key Linux directories including /home directory, /boot directory, /var directory, root (/) directory, /temp directory and swap have also been assessed. To undertake this study, server configurations in 15 public and 9 private organizations were screened. A total of 31 purposively selected server administrators were interviewed guided by a checklist of questions in a semi-structured questionnaire. A quick observation obtained from the findings of this study suggests that server virtualization adopters operate at high security risks due to existence of uncoordinated and unsecured VMs configuration due to lack of required expertise. Lack of regular system auditing and monitoring turn the adopters into vulnerable and target of attack at any time without the adopter’s knowledge. The need for adopters to observe best practices towards adoption and use of virtualization software is vital.\",\"PeriodicalId\":327958,\"journal\":{\"name\":\"Huria: Journal of the Open University of Tanzania\",\"volume\":\"71 2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Huria: Journal of the Open University of Tanzania\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4314/HURIA.V25I2\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Huria: Journal of the Open University of Tanzania","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4314/HURIA.V25I2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

管理程序和虚拟机的采用和使用已经成为虚拟服务器计算的核心,并且目前是跨不同公共和私有部门存储和共享数据的主要选择。然而,主要的安全威胁之一是采用者缺乏正确处理虚拟机管理程序安装、虚拟机创建和配置的知识。本文揭示了虚拟化系统的不同安全漏洞,这些漏洞是由采集者由于各种系统配置错误而造成的,例如跨虚拟基础设施使用统一的安装程序,类型2管理程序中的安全增强级别,开源管理程序中未受影响的默认设置,使用虚拟机文件格式中的供应商锁定,临时创建虚拟机和分配计算资源,特别是虚拟CPU, RAM和HDD。此外,还评估了未确定大小的关键Linux目录,包括/home目录、/boot目录、/var目录、根(/)目录、/temp目录和swap。为了进行这项研究,我们对15个公共机构和9个私人机构的服务器配置进行了筛选。在半结构化问卷中的问题清单的指导下,总共采访了31名有目的选择的服务器管理员。从这项研究的发现中获得的一个快速观察表明,服务器虚拟化采用者由于缺乏必要的专业知识而存在不协调和不安全的vm配置,因此操作的安全性风险很高。缺乏定期的系统审计和监视会使采用者在不知情的情况下随时成为易受攻击的目标。采用者必须遵守采用和使用虚拟化软件的最佳实践,这一点至关重要。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Review of Adopter’s Common Misconfigurations of Virtual Machines: The Case of Tanzania
Adoption and use of hypervisors and virtual machines have become heart of virtual server computing and are currently a primary choice to store and share data across different public and private sectors. However, one of the major security threats is on meager adopter’s knowledge on proper handling of hypervisor installation, VMs creation and configurations. This paper exposes distinct security vulnerabilities of virtualized systems that are caused by the adopters due to various system misconfigurations such as use of unified installer across virtual infrastructure, level of security enhancement in type 2 hypervisors, presence of untouched default settings in open source hypervisors, usage of vendor lock in VMs file formats, ad hoc creation of VMs and allocation of computing resources especially virtual CPU, RAM and HDD. Furthermore, undecided size of key Linux directories including /home directory, /boot directory, /var directory, root (/) directory, /temp directory and swap have also been assessed. To undertake this study, server configurations in 15 public and 9 private organizations were screened. A total of 31 purposively selected server administrators were interviewed guided by a checklist of questions in a semi-structured questionnaire. A quick observation obtained from the findings of this study suggests that server virtualization adopters operate at high security risks due to existence of uncoordinated and unsecured VMs configuration due to lack of required expertise. Lack of regular system auditing and monitoring turn the adopters into vulnerable and target of attack at any time without the adopter’s knowledge. The need for adopters to observe best practices towards adoption and use of virtualization software is vital.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Review of Adopter’s Common Misconfigurations of Virtual Machines: The Case of Tanzania Effectiveness of Mobile Learning as a means of Distance Learning in Tanzania Seroepidemiologic Survey for Human Sparganosis in Mto wa Mbu Division, Monduli District, Tanzania Marker-assisted Screening of Cotton Cultivars for Bacterial Blight Resistance Gene Animal Waste Management Practices and Perceptions on Public and Environmental Health Risks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1