Research paper

Virtualization and information security : a virtualized DMZ design consideration using VMware ESXi 4.1

View original item

About this item

Title
Virtualization and information security : a virtualized DMZ design consideration using VMware ESXi 4.1
Content partner
Unitec
Collection
Research Bank
Description

RESEARCH QUESTION: Is it secure to implement DMZ in a virtual network infrastructure? Sub-questions:  How can virtualized DMZs be implemented?  Which is the most secure type of virtual DMZ?  Which DMZ design is appropriate for a specific business requirement?  What impact will virtual DMZs have on information security in contrast to traditional DMZs?  What is to be avoided while deploying VMs in a DMZ? Virtualization is one of the most widely used technologies in modern day information t...

Format
Research paper
Research format
Thesis
Thesis level
Masters
Date created
2012
Creator
Singh, Shiv Raj
URL
https://hdl.handle.net/10652/2017
Related subjects
virtualisation / virtual DMZ / information security / comparison / quantitative research / vulnerability assessment / Computer System Security

What can I do with this item?

Check copyright status and what you can do with this item

Check information

Report this item

If you believe this item breaches our terms of use please report this item

Report this item

DigitalNZ brings together more than 30 million items from institutions so that they are easy to find and use. This information is the best information we could find on this item. This item was added on 08 December 2021, and updated 16 April 2024.
Learn more about how we work.

Share

What can I do with this item?

You must always check with Unitec to confirm the specific terms of use, but this is our understanding:

Research icon

Non-infringing use

NZ Copyright law does not prevent every use of a copyright work. You should consider what you can and cannot do with a copyright work.

NZ Copyright law does not prevent every use of a copyright work. You should consider what you can and cannot do with a copyright work.

No sharing icon

No sharing

You may not copy and/or share this item with others without further permission. This includes posting it on your blog, using it in a presentation, or any other public use.

You may not copy and/or share this item with others without further permission. This includes posting it on your blog, using it in a presentation, or any other public use.

No modifying icon

No modifying

You are not allowed to adapt or remix this item into any other works.

You are not allowed to adapt or remix this item into any other works.

No commercial use icon

No commercial use

You may not use this item commercially.

You may not use this item commercially.

View original item

What can I do with this item?

Check copyright status and what you can do with this item

Check information

Report this item

If you believe this item breaches our terms of use please report this item

Report this item

DigitalNZ brings together more than 30 million items from institutions so that they are easy to find and use. This information is the best information we could find on this item. This item was added on 08 December 2021, and updated 16 April 2024.
Learn more about how we work.

Share

Related items

Loading...