Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

A Virtually Perfect Fit Virtualization allows you to place numerous stand-alone

ID: 667018 • Letter: A

Question

A Virtually Perfect Fit

Virtualization allows you to place numerous stand-alone application servers onto a single server without sacrificing functionality. Each virtual server behaves as if it is running in its own physical system; it is unaware that it shares a physical server with other virtual servers. For this reason, it is referred to as a "virtual machine," or a "VM."

Why is virtualization so important? Historically, data centers dedicated one or more servers to host the applications of separate business units, because the units wanted complete control over their own infrastructures. This led to data centers full of servers running at only 5% to 10% of capacity. By turning to virtualization, data centers now can consolidate the workload and reduce their server counts (and therefore their energy and space requirements) by a factor of 10 or more while allowing business units to maintain control of their own information.

Furthermore, VMs may be quickly moved based upon fluctuating capacity requirements. Is one application suddenly bombarded by users? Switch it to a larger server with a larger capacity until the wave of activity passes. The fluidity of a virtual environment, however, means you probably have neither the ability to choose the specifications of your server nor any control over what other applications share that server with you.

By Day 3, name one class of application that is suitable to run in a virtual environment. Describe the risks and benefits of hosting this particular type of application in the cloud. In addition, identify one class of application that is particularly unsuited to virtual hosting, and explain why the risks outweigh the benefits in that case.

Explanation / Answer

Environmental security — The concentration of computing resources and users in a cloud computing environment also represents a concentration of security threats. Because of their size and significance, cloud environments are often targeted by virtual machines and bot malware, brute force attacks, and other attacks. Ask your cloud provider about access controls, vulnerability assessment practices, and patch and configuration management controls to see that they are adequately protecting your data.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote