Runs on “bare metal,” meaning it loads on physical hardware and doesn’t require a separate OS.
3
New cards
Virtual Machine Extensions (VMX)
Instruction sets called _____ are necessary to use virtualization; without these instruction sets, virtualization software doesn’t work.
4
New cards
Parallels Desktop
Was created for MAcintosh users who also use Windows applications. It runs both legacy and current Windows OSs as well as Linux.
5
New cards
Kernel-based Virtual Machine (KVM)
This open-source hypervisor enables you to choose between an Intel and an AMD CPU and to run Linux or Windows VMs. It’s now included as part of most Linux kernels.
6
New cards
Microsoft Hyper-V
Microsoft began its venture into virtualization with Virtual PC, which allowed you to create VMs that could run non-Windows OSs. Its new hypervisor is built into Windows 10, and unlike most programs, it isn’t downloaded.
7
New cards
Oracle VirtualBox:
It supports all Windows and Linux OSs as well as Macintosh and Solaris. This shareware can be downloaded and installed on both Windows and Linux host systems.
8
New cards
.vmx
Stores configuration files
9
New cards
.log
Contains logs of information such as when a VM was powered off, virtual appliances added, and so on
10
New cards
.nvram
Keeps track of the state of a VM’s BIOS
11
New cards
.vmdk
Stores the virtual hard drive’s contents
12
New cards
.vmem
Stores VM paging files, which serve as RAM
13
New cards
.vmsd
Contains information about snapshots
14
New cards
.ova or .ovf
File used to create a virtual machine; OVF stands for “Open Virtualization Format”
15
New cards
.vdi
Disk image file
16
New cards
.r0
Default libraries
17
New cards
.vbox
Saved settings of virtual hard drives
18
New cards
.xml-prev
Backups of XML settings
19
New cards
Order of Votality (OOV)
It determines how long a piece of information lasts on a system.
20
New cards
Network Forensics
The process of collecting and analyzing raw network data and tracking network traffic systematically to ascertain how an attack was carried out or how an event occurred on a network.
21
New cards
Layered Network Defense Strategy
Sets up layers of protection to hide the most valuable data at the innermost part of the network. It also ensures that the deeper into the network an attacker gets, the more difficult access becomes and the more safeguards are in place.
22
New cards
Honeynet Project
Developed to make information widely available in an attempt to thwart Internet ad network attackers.
23
New cards
Zombies
Machines used in DDoS attacks.
24
New cards
Zero Day Attacks
Attackers look for holes in networks and OSs and exploit these weaknesses before patches are available.
25
New cards
Honeypot
A computer set up to look like any other machine on your network; its purpose is to lure attackers to your network, but it contains no information of real value.
26
New cards
Honeywalls
Are computers set up to monitor what’s happening to honeypots on your network and record what attackers are doing.