Professional Documents
Culture Documents
Response Mounika
Response Mounika
Response Mounika
Response
You significantly answered the questions and were an interesting read. Data wiping
renders data inaccessible but would not delete it. On the other hand, it is the act of overwriting
the information about a specific hard drive to the point where the source document is
inaccessible (Olvecky & Gabriska, 2018). This assures that the firm in issue is properly securely
disposing of all IT resources, ensuring that user data is not revealed to a third-party provider. The
hypervisor especially functions in a stealth manner. It operates underneath the machine in case of
hyperjacking, making it even more challenging to identify and more probable obtain control to
computer infrastructure where it may influence the functioning of the whole institution or
organization (W & Prabakaran, 2020). If the attacker receives possession of the hypervisor,
they can alter everything linked to that network. An intruder would also attempt to manage one
VM by infiltrating another virtual machine housed on the same device in Guest hopping attacks.
Forensic and VM functional testing to monitor cloud security are among the potential
countermeasures of Guest hopping attacks (Dong & Lei, 2019). These assaults outperform
implements various layers of controls inside the network architecture to ensure the sustainability
and reliability of cloud-based resources such as sites and internet apps. Organizations must
manage DDoS protection, maximum resilience, data protection, and legislative conformity in
their cloud-based security supplier, whether in the public or personal cloud (Islam, 2017).
References
2
Dong, Y., & Lei, Z. (2019). An Access Control Model for Preventing Virtual Machine Hopping
http://ijcsit.com/docs/Volume%208/vol8issue2/ijcsit2017080219.pdf
Jones, A., & Afrifa, I. (2020). An Evaluation Of Data Erasing Tools. The Journal of Digital
2744. http://sersc.org/journals/index.php/IJAST/article/view/15440