Some threats to virtualized systems are general in nature, as they are inherent threats to all computerized systems (such as denial-of-service, or DOS, attacks). Other threats and vulnerabilities, however, are unique to virtual machines. Many VM vulnerabilities stem from the fact that a vulnerability in one VM system can be exploited to attack other VM systems or the host systems, as multiple virtual machines share the same physical hardware. Various organizations have conducted security analysis and proof-of-concept (PoC) attacks against virtualized systems, and their research regarding security in virtual environments highlights some of the vulnerabilities exposed to any malicious-minded individuals. Some of these attacks are listed below. Please provide a brief description of each of these attacks as they relate to VMs:
Shared clipboard Keystroke logging VM monitoring from the host Virtual machine monitoring from another VM Virtual machine backdoors /IVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVIVI Please Answer Below In One Page:
VM sprawl is a general term describing the propagation of virtual systems across the enterprise in an uncontrolled way. Rogue machines can consume resources and bandwidth as well as present new vulnerabilities with virtual machines that are not being patched and monitored. Forensics cannot be conducted in the virtual environment in which these machines aren’t even visible to the organization. Should an event occur, organizations need to not only know what part of the network is affected, but also be able to roll back network and system records in time to determine what happened.:
Please give your thoughts on what types of tools and/or technical approaches might be useful to address these situations.