- To deflect attacks from your real production network
- Warn you in advance the types of attacks you have done so that you have time to protect against them on the network and 'real' systems.
- Logically collect information to be used to identify attacks
If virtual machine operating systems transmit content within them and share disks on a LAN, it will create a vulnerability that can be exploited and negate some of the isolation effect in use. virtual machine.
Honeypot and Honeynet
Honeypot is a computer set up for the purpose of 'decoy' attackers, and honeynet makes an entire network consisting of honeypots. Honeynet seems like a production network. Its purpose is:
Honeypot and honeynet can be built using physical machines, but that can be expensive and difficult to manage. With virtualization technology, a large honeynet can be built on a physical machine at a much lower cost. Virtual desktops can surf the web to find out what viruses and malware are in which your AV software doesn't support protection.
Note:
As the best security operation, honeypots are equipped to deflect attacks from the Internet that need to run on a dedicated physical machine, which is not connected to your production network, or has firewalls set between them. Honeynet is typically placed in the perimeter or DMZ network. Another method is to place a honeypot on the internal network to detect the internal attacks.
Because so many organizations today run their consolidated servers on virtual machines, the virtual environment is perceived shortly before becoming a target for more interesting attackers for production networks. authentic.
Conclude
Properly deployed virtual machine technologies add another layer of security to the computers on your network. With the best security operations used, the operating systems and applications running on virtual machines will be secure and from there you will be able to safely protect them on physical machines. It is also the ultimate goal and that shows that virtualization is also one of the tools in your security arsenal.