Index
A
- access control
- about / Access control
- discretionary access control (DAC) / Access control
- mandatory access control (MAC) / Access control
- role-based access control (RBAC) / Access control
- Address Resolution Protocol (ARP) spoofing
- Advanced Encryption Standard (AES)
- about / Block cipher
- Advanced Persistent DoS (APDoS)
- about / Denial of Service
- Advanced Persistent Threat
- about / Advanced Persistent Threat
- Amazon CloudFormation
- about / OpenStack Orchestration – Heat
- Amazon CloudWatch
- about / OpenStack Telemetry – Ceilometer
- Amazon Elastic Block Store (EBS)
- Amazon Elastic Compute Cloud (EC2)
- about / OpenStack Compute Service – Nova
- Amazon Elastic MapReduce (EMR)
- Amazon Machine Image (AMI)
- about / OpenStack Image Service – Glance
- Amazon Relational Database Service (RDS)
- Amazon Route 53
- about / Designate – DNS
- Amazon Simple Notification Service (SNS)
- about / Zaqar – cloud messaging
- Amazon Simple Queue Service (SQS)
- about / Zaqar – cloud messaging
- Amazon Simple Storage Service (S3)
- Amazon Web Services (AWS)
- AMD-Vi
- about / Hardware concerns
- Anonymous
- about / Availability
- Apache httpd
- about / Apache HTTPd
- Apache HTTPd
- configuring / Configuring Apache HTTPd
- APIs
- redundant environment, designing for / Designing a redundant environment for your APIs
- AppArmor
- about / Containers, Docker, Additional security features
- application firewall
- about / Firewall
- application layer, Open Systems Interconnection (OSI) model
- about / Layer 7 – the Application layer
- asymmetric encryption
- about / Asymmetric encryption
- Diffie-Hellman / Diffie-Hellman
- RSA algorithm / RSA algorithm
- Elliptic Curve Cryptography (ECC) / Elliptic Curve Cryptography
- versus symmetric encryption / Symmetric/asymmetric comparison and synergies
- attackers
- about / Possible attackers
- automated attacks/script kiddies / Possible attackers
- motivated individuals / Possible attackers
- highly capable groups / Possible attackers
- organized hackers / Possible attackers
- intelligence agencies/services / Possible attackers
- attacks
- about / The possible attacks
- Denial of Service (DoS) / Denial of Service
- 0-day / 0-day
- Brute force / Brute force
- Advanced Persistent Threat / Advanced Persistent Threat
- Automated exploitation tools / Automated exploitation tools
- ISP intercept / The ISP intercept
- supply chain attack / The supply chain attack
- social engineering / Social engineering
- Hypervisor breakout / The Hypervisor breakout
- authentication
- about / Identification versus authentication versus authorization, Authentication
- performing, ways / Authentication
- downsides / Something you have
- behavioral characteristics / Something you are
- multifactor authentication / The multifactor authentication
- authorization
- about / Identification versus authentication versus authorization, Authorization
- Discretionary Access Control (DAC) / Discretionary Access Control
- Role-based Access Control (RBAC) / Role-based Access Control
- Lattice-Based Access Control (LBAC) / Lattice-based Access Control
- Automated exploitation tools
- about / Automated exploitation tools
- metasploit / Automated exploitation tools
- nessus / Automated exploitation tools
- availability
- about / Availability
- AWS Elastic Beanstalk
- about / OpenStack Compute Service – Nova
- AWS Identity and Access Management (IAM)
- AWS Key Management Service (KMS)
- about / Barbican – key management
- AWS Management Console
- about / OpenStack Dashboard – Horizon
- AWS Storage Gateway
- about / Manila – file sharing
B
- backends
- about / Backends
- Ceph / Ceph
- GlusterFS / GlusterFS
- Logical Volume Manager (LVM) / The Logical Volume Manager
- Network File System (NFS) / The Network File System
- Sheepdog / Sheepdog
- Swift / Swift
- Z File System (ZFS) / Z File System (ZFS)
- Barbican
- about / Barbican – key management
- Baremetal
- about / Baremetal
- behaviometrics
- about / Something you are
- Bell-LaPadula model / Confidentiality
- Biba integrity model
- about / Integrity
- biometric identifiers
- about / Something you are
- block cipher
- about / Block cipher
- confusion / Block cipher
- diffusion / Block cipher
- substitution / Block cipher
- transposition / Block cipher
- block storage
- about / Block storage
- disadvantage / Block storage
- Border Gateway Protocol (BGP)
- about / Layer 3 – the Network layer
- Bridge Protocol Data Units (BPDU)
- Brute force
- about / Brute force
C
- CAM table overflow attack
- Castle Approach
- catch-all rule / Configuring iptables
- Ceilometer
- about / OpenStack Telemetry – Ceilometer
- Ceph
- about / File storage, Ceph
- CephFS
- about / Ceph
- Certificate Revocation List (CRL)
- about / Public key infrastructure
- Certify Authority (CA)
- about / Public key infrastructure
- cgroups
- about / Docker, Additional security features
- chain
- about / Confidentiality
- chroot
- about / Containers
- CIA model
- about / The CIA model
- confidentiality / Confidentiality
- integrity / Integrity
- availability / Availability
- considerations / Some considerations
- real-world example / A real-world example
- Cinder
- Cipher security
- about / Cipher security
- circuit-level gateway
- about / Firewall
- Cisco Discovery Protocol (CDP)
- about / Layer 2 – the Data link layer
- Cisco Discovery Protocol (CDP) attacks
- clean pipes / Denial of Service
- cloud
- Cloud Service Provider (CSP)
- about / The public cloud
- collision
- about / Hashing
- commercial off-the-shelf (COTS)
- about / OpenStack Compute Service – Nova
- Common Criteria
- about / Certifications and attestations
- Common Internet File System (CIFS)
- about / File storage
- components, built upon librados
- components, relying on RADOS
- Compute Unified Device Architecture (CUDA)
- confidentiality
- about / Confidentiality
- containers
- about / Containers
- Content Addressable Memory (CAM)
- about / Layer 2 – the Data link layer
- Copy On Write (COW)
- about / Hypervisor memory optimization
- criteria, for selecting hypervisor
- about / Criteria for choosing a hypervisor
- team expertise / Team expertise
- product or project maturity / Product or project maturity
- certifications / Certifications and attestations
- attestations / Certifications and attestations
- features / Features and performance
- performance / Features and performance
- hardware concerns / Hardware concerns
- hypervisor memory optimization / Hypervisor memory optimization
- additional security features / Additional security features
D
- 0-day attack
- about / 0-day
- data center security
- about / Data center security
- location, selecting / Select a good place
- castle-like structure, implementing / Implement a castle-like structure
- authorization points, securing / Secure your authorization points
- employees, defending / Defend your employees
- support systems, defending / Defend all your support systems
- low profile, keeping / Keep a low profile
- power of redundancy / The power of redundancy
- cameras / Cameras
- blueprints / Blueprints
- data center, in office / Data center in office
- Data Encryption Standard (DES)
- about / Block cipher
- data link layer, Open Systems Interconnection (OSI) model
- about / Layer 2 – the Data link layer
- Address Resolution Protocol (ARP) spoofing / Address Resolution Protocol (ARP) spoofing
- MAC flooding attack / MAC flooding and Content Addressable Memory table overflow attack
- CAM table overflow attack / MAC flooding and Content Addressable Memory table overflow attack
- Dynamic Host Configuration Protocol (DHCP) starvation attack / Dynamic Host Configuration Protocol (DHCP) starvation attack
- Cisco Discovery Protocol (CDP) attacks / Cisco Discovery Protocol (CDP) attacks
- Spanning Tree Protocol (STP) attacks / Spanning Tree Protocol (STP) attacks
- Virtual LAN (VLAN) attacks / Virtual LAN (VLAN) attacks
- DDoS
- about / Availability
- Defense in depth
- Denial of Service (DoS) attack
- about / Denial of Service
- buffer overflow attacks / Denial of Service
- SYN Flood attacks / Denial of Service
- teardrop attacks / Denial of Service
- smurf attacks / Denial of Service
- viruses/worms / Denial of Service
- Designate
- about / Designate – DNS
- Diffie-Hellman algorithm
- about / Diffie-Hellman
- Diffie-Hellman protocol
- parameter (p) / Diffie-Hellman
- generator (g) / Diffie-Hellman
- Direct Memory Access (DMA)
- discrete logarithm problem
- about / Diffie-Hellman
- discretionary access control (DAC)
- about / Access control
- Discretionary Access Control (DAC)
- about / Discretionary Access Control
- Docker
- about / Containers, Docker
- Domain Name System (DNS)
- about / Layer 7 – the Application layer
- DoS
- about / Availability
- DoS Defense System (DDS)
- about / Denial of Service
- DreamObject Cloud Store
- about / Ceph
- Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG)
- about / Elliptic Curve Cryptography
- Dynamic Host Configuration Protocol (DHCP)
- about / Layer 2 – the Data link layer
- Dynamic Host Configuration Protocol (DHCP) starvation attack
E
- Economic Denial of Sustainability (EDoS)
- about / Availability
- Edwards-curve Digital Signature Algorithm (EdDSA)
- about / Elliptic Curve Cryptography
- Elliptic Curve Cryptography (ECC)
- about / Elliptic Curve Cryptography
- Elliptic Curve Diffie-Hellman (ECDH)
- about / Elliptic Curve Cryptography
- Elliptic Curve Digital Signature Algorithm (ECDSA)
- about / Elliptic Curve Cryptography
- encryption security
- about / Encryption security
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- about / Layer 3 – the Network layer
- examples of SELinux Booleans, dealing with sVirt
- virt_use_common / sVirt – SELinux and virtualization
- virt_use_fusefs / sVirt – SELinux and virtualization
- virt_use_nfs / sVirt – SELinux and virtualization
- virt_use_samba / sVirt – SELinux and virtualization
- virt_use_sanlock / sVirt – SELinux and virtualization
- virt_use_sysfs / sVirt – SELinux and virtualization
- virt_use_usb / sVirt – SELinux and virtualization
- virt_use_xserver / sVirt – SELinux and virtualization
- Extended Validation (EV) / Signed certificates versus self-signed certificates
F
- Federated Identity
- about / Federated identity
- Federated identity
- about / Federated identity
- Fiber Channel (FC)
- about / Block storage
- Fiber Channel over Ethernet (FCoE)
- about / Block storage
- files, on filesystems
- drawbacks / Where to store the logs?
- file storage
- about / File storage
- File Transfer Protocol (FTP)
- about / Layer 7 – the Application layer
- firewall
- about / Firewall
- first generation firewall
- about / Firewall
- flat network
- full virtualization
- about / Full virtualization
- future components
- about / Future components
- Ironic, bare metal provisioning / Ironic – bare metal provisioning
- Zaqar, cloud messaging / Zaqar – cloud messaging
- Manila, file sharing / Manila – file sharing
- Designate, DNS / Designate – DNS
- Barbican, key management / Barbican – key management
G
- Generic Routing Encapsulation (GRE)
- Glance
- about / OpenStack Image Service – Glance
- GlusterFS
- about / File storage, GlusterFS
- Gluster Inc.
- about / GlusterFS
- GNU Privacy Guard (GPG)
- about / A real-world example
- GRSEC
- about / Containers
H
- Hacktivist
- about / Possible attackers
- Hardware Compatibility List (HCL)
- about / Hardware concerns
- hardware management, aspects
- about / Hardening the hardware management
- physical hardware / Physical hardware – PCI passthrough
- virtual hardware, with Quick Emulator (QEMU) / Virtual hardware with Quick Emulator
- Hardware Security Module (HSM)
- about / Baremetal
- hashing
- about / Hashing
- hashing algorithms
- Heat
- about / OpenStack Orchestration – Heat
- Horizon
- about / OpenStack Dashboard – Horizon
- host operative system
- hardening / Hardening the host operative system
- HTTPS
- enforcing, for future connections / Enforcing HTTPS for future connections
- hybrid cloud
- hybrid encryption
- Hyper-V
- about / Hyper-V
- Hypertext Transfer Protocol (HTTP)
- about / Layer 7 – the Application layer
- hypervisor breakout
- about / Full virtualization
- Hypervisor breakout
- about / The Hypervisor breakout
- hypervisors
- about / Hypervisors
- Kernel-based Virtual Machine (KVM) / Kernel-based Virtual Machine
- Xen / Xen
- VMware ESXi / VMware ESXi
- Hyper-V / Hyper-V
- criteria, for selecting / Criteria for choosing a hypervisor, Team expertise, Product or project maturity, Features and performance, Hypervisor memory optimization
I
- I/O Virtualization Technology (AMD-Vi)
- identification
- Identity Provider (IdP)
- about / Federated identity
- Infrastructure as a Service (IaaS)
- about / The OpenStack structure
- Input/Output Memory Management Unit (IOMMU)
- integrity
- about / Integrity
- Intel Trusted Execution Technology (Intel TXT)
- about / Additional security features
- Internet Control Message Protocol (ICMP)
- about / Layer 3 – the Network layer
- Internet Engineering Task Force (IETF)
- about / The Network File System
- Internet Group Management Protocol (IGMP)
- about / Layer 3 – the Network layer
- Internet Protocol (IP)
- about / Layer 3 – the Network layer
- Internet Protocol Security (IPSec)
- about / Layer 3 – the Network layer
- Internet Small Computer System Interface (iSCSI)
- about / Block storage
- Intrusion Detection and Prevention Systems (IDPS)
- Intrusion detection system (IDS)
- about / Intrusion detection system (IDS)
- Intrusion Detection Systems (IDS)
- Intrusion prevention system (IPS)
- Intrusion Prevention System (IPS)
- about / Denial of Service
- Intrusion prevention systems (IPS)
- about / Layer 4 – the Transport layer
- Ironic
- about / Ironic – bare metal provisioning
- ISO/IEC 7498-1
- ISP intercept
- about / The ISP intercept
K
- Kernel-based Virtual Machine (KVM)
- about / Kernel-based Virtual Machine
- Kernel Samepage Merging (KSM)
- about / Hypervisor memory optimization
- Keystone
- about / OpenStack Identity Service – Keystone
- setting up, as service provider / Setting up Keystone as a Identity Provider
- configuring / Configuring OpenStack Keystone
- knowledge factor
- about / The multifactor authentication
L
- Lattice-Based Access Control (LBAC)
- about / Lattice-based Access Control
- librados
- about / Ceph
- like for like method / Shortcuts
- Linux Containers (LXC)
- about / Containers, Linux Containers
- Logical Volume (LV)
- about / The Logical Volume Manager
- Logical Volume Manager (LVM)
- about / The Logical Volume Manager
- logs
- significance / The importance of logs
- location, for storing / Where to store the logs?
- what to log, evaluating / Evaluate what to log
- number of logs, evaluating / Evaluate the number of logs
M
- MAC flooding attack
- mandatory access control (MAC)
- about / Access control
- Mandatory Access Control (MAC)
- Manila
- about / Manila – file sharing
- Manila component
- about / File storage
- Man in the Middle (MitM) attack
- Marconi
- about / Zaqar – cloud messaging
- MD5
- about / MD5
- Media Access Control (MAC)
- about / Layer 2 – the Data link layer
- metasploit / Automated exploitation tools
- Multi-Level Security (MLS)
- multifactor authentication
- about / The multifactor authentication
- Multi Level Security (MLS)
- about / Access control
- multiple factor authentication
- about / Authentication
N
- National Institute of Standards and Technology (NIST) / Simple forgetfulness
- National Security Agency (NSA)
- nessus / Automated exploitation tools
- Network behavior analysis (NBA)
- about / Layer 4 – the Transport layer
- Network File System (NFS)
- networking resource policy engine / The networking resource policy engine
- network layer, Open Systems Interconnection (OSI) model
- about / Layer 3 – the Network layer
- networks
- advantages / Different uses means different network
- Network Time Protocol (NTP)
- about / Layer 7 – the Application layer
- Neutron
- nginx
- about / Nginx
- Nova
- about / OpenStack Compute Service – Nova
O
- object storage
- about / Object storage
- Open Shortest Path First (OSPF)
- about / Layer 3 – the Network layer
- OpenStack
- about / The OpenStack structure
- OpenStack API
- securing, with TLS / Secure your OpenStack API with TLS
- OpenStack deployment
- secure network, designing for / Design a secure network for your OpenStack deployment
- OpenStack Keystone configuration, for using Apache HTTPd
- about / Configuring OpenStack Keystone to use Apache HTTPd
- Apache HTTPd configuration / Apache HTTPd configuration
- Keystone, making available to Apache HTTPd / Making Keystone available to Apache HTTPd
- iptables, configuring / Configuring iptables
- firewall, configuring / Configuring firewalld
- SELinux / SELinux
- shared tokens, setting up / Setting up shared tokens
- startup properly, setting up / Setting up the startup properly
- OpenStack structure
- about / The OpenStack structure
- Nova, OpenStack Compute Service / OpenStack Compute Service – Nova
- Swift, OpenStack Object Storage Service / OpenStack Object Storage Service – Swift
- Glance, OpenStack Image Service / OpenStack Image Service – Glance
- Horizon, OpenStack Dashboard / OpenStack Dashboard – Horizon
- Keystone, OpenStack Identity Service / OpenStack Identity Service – Keystone
- Neutron, OpenStack Networking Service / OpenStack Networking Service – Neutron
- Cinder, OpenStack Block Storage Service / OpenStack Block Storage Service – Cinder
- Heat, OpenStack Orchestration / OpenStack Orchestration – Heat
- Ceilometer, OpenStack Telemetry / OpenStack Telemetry – Ceilometer
- Trove, OpenStack Database Service / OpenStack Database Service – Trove
- Sahara, OpenStack Data Processing Service / OpenStack Data Processing Service – Sahara
- OpenStack Swift, securing
- about / Securing OpenStack Swift
- information, hiding / Hiding information
- ports, securing / Securing ports
- Open Systems Interconnection (OSI) model
- about / The Open Systems Interconnection model
- physical layer / Layer 1 – the Physical layer
- data link layer / Layer 2 – the Data link layer
- network layer / Layer 3 – the Network layer
- transport layer / Layer 4 – the Transport layer
- session layer / Layer 5 – the Session layer
- presentation layer / Layer 6 – the Presentation layer
- application layer / Layer 7 – the Application layer
- OpenVZ
- about / Containers
- ownership factor
- about / The multifactor authentication
P
- packet filter firewall
- about / Firewall
- paravirtualization
- about / Paravirtualization
- partial virtualization
- about / Partial virtualization
- people aspect, of security
- about / The people aspect of security
- simple forgetfulness / Simple forgetfulness
- shortcuts / Shortcuts
- human error / Human error
- lack of information / Lack of information
- social engineering / Social engineering
- evil actions, under threats / Evil actions under threats
- evil actions, for personal advantage / Evil actions for personal advantage
- pharming
- about / Integrity
- physical layer, Open Systems Interconnection (OSI) model
- about / Layer 1 – the Physical layer
- Physical Volume (PV)
- about / The Logical Volume Manager
- presentation layer, Open Systems Interconnection (OSI) model
- about / Layer 6 – the Presentation layer
- prime factorization problem
- about / RSA algorithm
- Principle of Insecurity
- about / The Principle of Insecurity
- Principle of Internal Security
- Principle of Least Privilege
- about / The Principle of Least Privilege
- Principle of Separation of Duties
- private cloud
- about / Private cloud versus public cloud security, The private cloud
- advantages / Private cloud versus public cloud
- disadvantages / Private cloud versus public cloud
- private cloud security
- versus public cloud security / Private cloud versus public cloud security
- public cloud
- about / Private cloud versus public cloud security, The public cloud
- sintetized private cloud / Private cloud versus public cloud
- disadvantages / Private cloud versus public cloud
- advantages / Private cloud versus public cloud
- public cloud security
- versus private cloud security / Private cloud versus public cloud security
- Public key infrastructure (PKI)
- about / Public key infrastructure
Q
- Quality of Service (QoS)
- about / Layer 2 – the Data link layer
- Quick Emulator (QEMU)
R
- Rackspace
- about / Swift
- RADOS Block Device (RBD)
- about / Ceph
- RADOS Gateway (RADOSGW)
- about / Ceph
- Red Hat Enterprise Virtualization (RHEV)
- about / Kernel-based Virtual Machine
- redundant environment
- designing, for APIs / Designing a redundant environment for your APIs
- Reliable, Autonomous, Distributed Object Store (RADOS)
- about / Ceph
- Role-based Access Control (RBAC)
- about / Role-based Access Control
- role-based access control (RBAC)
- about / Access control
- Routing Information Protocol (RIP)
- about / Layer 3 – the Network layer
- RSA algorithm
- about / RSA algorithm
S
- Sahara
- second generation firewall
- about / Firewall
- secure network
- designing, for OpenStack deployment / Design a secure network for your OpenStack deployment
- secure networks
- architecting / Architecting secure networks
- Secure Shell (SSH)
- about / Securing ports
- Secure Sockets Layer (SSL) / Stream cipher
- Secure Virtualization (sVirt)
- secure zone
- security
- about / Security
- security, principles
- about / The principles of security
- Principle of Insecurity / The Principle of Insecurity
- Principle of Least Privilege / The Principle of Least Privilege
- Principle of Separation of Duties / The Principle of Separation of Duties
- Principle of Internal Security / The Principle of Internal Security
- Security-Enhanced Linux (SELinux)
- Security Enhanced Linux (SELinux)
- about / Kernel-based Virtual Machine
- security levels
- public / Confidentiality
- confidential / Confidentiality
- secret / Confidentiality
- top access control / Confidentiality
- Security Technical Implementation Guides (STIG)
- security threats
- self-signed certificates
- versus signed certificates / Signed certificates versus self-signed certificates
- SELinux
- about / Containers, Docker
- Server Message Block (SMB)
- about / File storage
- server security
- about / Server security
- disadvantages / Server security
- service provider
- Keystone, setting up as / Setting up Keystone as a Identity Provider
- Service Provider (SP)
- about / Federated identity
- session layer, Open Systems Interconnection (OSI) model
- about / Layer 5 – the Session layer
- session management
- about / Session management
- SHA
- about / SHA
- SHA-0
- about / SHA
- SHA-1
- about / SHA
- SHA-2
- about / SHA
- SHA-3
- about / SHA
- Sheepdog
- about / Sheepdog
- Shibboleth
- configuring / Configuring Shibboleth
- signed certificates
- versus self-signed certificates / Signed certificates versus self-signed certificates
- Simple Mail Transfer Protocol (SMTP)
- about / Layer 7 – the Application layer
- single factor authentication
- about / Authentication
- sintetized private cloud
- versus public cloud / Private cloud versus public cloud
- social engineering / Social engineering
- about / Social engineering
- Sockets Direct Protocol (SDP)
- about / GlusterFS
- software-defined networking (SDN)
- Spanning Tree Protocol (STP)
- about / Layer 2 – the Data link layer
- Spanning Tree Protocol (STP) attacks
- SSL options
- SSLEngine On / Apache HTTPd
- SSLProtocol / Apache HTTPd
- SSLCipherSuite / Apache HTTPd
- SSLCACertificateFile / Apache HTTPd
- SSLCertificateFile / Apache HTTPd
- SSLCERTIFICATEKeyFile / Apache HTTPd
- stateful firewalls
- about / Firewall
- storage
- security / Security
- storage solutions
- comparing / Comparison between storage solutions
- storage types
- about / Different storage types
- object storage / Object storage
- block storage / Block storage
- file storage / File storage
- stream cipher
- about / Stream cipher
- supply chain attack
- about / The supply chain attack
- sVirt
- Swift
- SwiftStack
- about / Swift
- symmetric encryption
- about / Symmetric encryption
- stream cipher / Stream cipher
- block cipher / Block cipher
- versus asymmetric encryption / Symmetric/asymmetric comparison and synergies
- Synchronous Digital Hierarchy (SDH)
- about / Layer 1 – the Physical layer
- Synchronous Optical Networking (SONET)
- about / Layer 1 – the Physical layer
- syntax layer
- about / Layer 6 – the Presentation layer
T
- TCP/IP stack
- about / TCP/IP
- TLS
- OpenStack API, securing with / Secure your OpenStack API with TLS
- Topology Change Notification (TCN)
- Total Cost of Operation (TCO)
- about / Kernel-based Virtual Machine
- Transmission Control Protocol (TCP)
- about / Layer 4 – the Transport layer
- Transparent Page Sharing (TPS)
- about / Hypervisor memory optimization
- transport layer, Open Systems Interconnection (OSI) model
- about / Layer 4 – the Transport layer
- Transport Layer Security (TLS)
- about / Layer 5 – the Session layer
- Triple Data Encryption Standard (3DES or Triple DES)
- about / Block cipher
- Trove
- Trusted Platform Module (TPM)
U
- User Datagram Protocol (UDP)
- about / Layer 4 – the Transport layer
V
- virtualization
- types / Various types of virtualization
- full virtualization / Full virtualization
- paravirtualization / Paravirtualization
- partial virtualization / Partial virtualization
- virtualization levels
- comparing / Comparison of virtualization levels
- Virtualization Technology for Directed I/O (VT-d)
- Virtual LAN (VLAN)
- Virtual LAN (VLAN) attacks
- about / Virtual LAN (VLAN) attacks
- Virtual LANs (VLAN)
- about / Layer 2 – the Data link layer
- Virtual Private Network as a Service (VPNaaS) / Virtual Private Network as a Service (VPNaaS)
- VLAN Trunking Protocol (VTP)
- about / Virtual LAN (VLAN) attacks
- VMware Elastic Sky X (ESX)
- about / VMware ESXi
- VMware ESXi
- about / VMware ESXi
- limitations / VMware ESXi
- Volume Group (VG)
- about / The Logical Volume Manager
- VT-d
- about / Hardware concerns
- VXLAN
W
- Wi-Fi Protected Access (WPA) / Stream cipher
- Wired Equivalent Privacy (WEP) / Stream cipher
X
- Xen
- Xen Security Modules (XSM)
- about / Additional security features
Z
- Zaqar
- about / Zaqar – cloud messaging
- Z File System (ZFS)
- about / Z File System (ZFS)