3/20/2024
C.T.N. Strong
Cybersecurity refers to a series of measures taken to protect computer systems, network systems and data from unauthorized access, which include theft, damage, tampering and interference on the Internet (Li, 2023). Professionals in the cybersecurity field are responsible for not only identifying risk in an organization, but also helping to prevent, remediate, and fix security breaches within that organization. While working in cybersecurity, one must take into
consideration the essential concepts surrounding ethics in cybersecurity. When taking into consideration issues of ethics one must consider confidentiality, privacy, and integrity. When dealing with the personal data of others, one must uphold a high level of integrity, which means that they will perform duties with honesty and truthfulness. Professionals in cybersecurity must be honest about keeping the confidentiality of the data collected within the rules and guidelines of the organization in which they are employed. Confidentiality and privacy go together whereas the data collected will be protected from unauthorized personnel. This brings about the issues of access, authentication, and authorization. When dealing with data collected within an organization, cybersecurity professional must make sure that the people they give access or
privilege to the information have the proper rights, which are proven though different authentication measures. These authentication measures prove that certain individuals have the right authorizations before being allowed access to privy information.
Operating Systems
While both act as an operating system, the main difference between the host operating system and the guest operation system is their locations. While located and installed on a computer systems hardware, the guest host is located on a virtual machine. The virtualization layer is also known as hypervisor and the hypervisor provides standardized hardware resources to the virtual machines (Jane, 2016). Hypervisors can be either bare-metal hypervisor or hosted hypervisor (Jane, 2016). The differences between these two hypervisors are based on the location of where they are installed. Bare-metal can be installed on a hardware while hosted hypervisor
are installed on the operating system of the hardware. Therefore, Bare-metal is more efficient than a hosted hypervisor, but hosted hypervisor can have a range of hardware configurations (Jane, 2016).
Virtualized Computing Environment
There are many advantages and disadvantages associated with virtualization. Working in a virtualized computing environment supports efficient memory access as well as giving protection to different regions of memory from unauthorized access (AMD, 2023). The disadvantage associated with working in a virtualized computing environment is that it is not the actual organizational data system, therefore one is unable to see exactly how specific tests affect the actual system. Virtualization can greatly assist cybersecurity analysis in working with malware. It gives a safe and controlled environment to master the identification and examination
of malware as well as provide information about the timing associated with different malware. Virtualization gives a wealth of information to cybersecurity analysis which can be used to help
protect the data and computer infrastructure of an organization.
References
Advanced Micro Devices, I. (Santa C. C., & ATI TECHNOLOGIES ULC (Markham). (2023). Secure memory access in a virtualized computing environment.
Jain, N., & Choudhary, S. (2016). Overview of virtualization in cloud computing. 2016Symposium on Colossal Data Analysis and Networking (CDAN), Colossal Data Analysis and Networking (CDAN), Symposium On, 1–4. https://doi org.lopes.idm.oclc.org/10.1109/CDAN.2016.7570950
Li, Q., Liu, B., & Chen, P. (2023). An overview of cybersecurity based on Network Security Situational Awareness and Machine learning. 2023 8th International Conference on Intelligent Computing and Signal Processing (ICSP), Intelligent Computing and SignalProcessing (ICSP), 2023 8th International Conference On, 279–285. https://doiorg.lopes.idm.oclc.org/10.1109/ICSP58490.2023.10248496