VLAN

1. Broadcast isolation on switches

2. Separation of security Zones

Security Virtual Machines

1. Access control and Secure KVM (kernel based VMs)

2. Kernel based Virtual machine (KVM) is an open source virtual Technology built into Linux.Specifically,KVM lets you turn Linux into a hypervisor that allows a host machine to run multiple ,isolated virtual environments called guest or virtual machine (VMs).

3. Isolated Data channels: makes it impossible for data to be transferred between connected computers via the KVM.

4. Tamper warning labels/Housing Intrusion detection: Provide indication if enclosure has been compromise.

5. Fixed firmware: can't be modified.

6. Tamper-proof circuit board: can't be modified.

7. Selective USB error.

8. Safe buffer design.

9. Push-button control.

Post a Comment

Previous Post Next Post