2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet510/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   506   507   508   509   510   511   512   513   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Virtual Software

virtual application
is a software product deployed in such a way that it is fooled into 
believing it is interacting with a full host OS. A virtual (or virtualized) application has been 
packaged or encapsulated to make it portable and able to operate without the full instal-
lation of its original host OS. A virtual application has enough of the original host OS 
included in its encapsulation bubble (technically called a virtual machine, or VM) that it 
operates/functions as if it were traditionally installed. Some forms of virtual applications 
are used as portable apps (short for applications) on USB drives. Other virtual applications 
are designed to be executed on alternative host OS platforms—for example, running a 
Windows application within a Linux OS.
The term 
virtual desktop
refers to at least three different types of technology:

A remote access tool that grants the user access to a distant computer system by allow-
ing remote viewing and control of the distant desktop’s display, keyboard, mouse, and 
so on.

An extension of the virtual application concept encapsulating multiple applications 
and some form of “desktop” or shell for portability or cross-OS operation. This 
technology offers some of the features/benefits/applications of one platform to users 
of another without the need for multiple computers, dual-booting, or virtualizing an 
entire OS platform.

An extended or expanded desktop larger than the display being used allows the user 
to employ multiple application layouts, switching between them using keystrokes or 
mouse movements.


548
Chapter 12 

Secure Communications and Network Attacks
See Chapter 8, “Principles of Security Models, Design, and Capabilities,” and Chapter 9, 
“Security Vulnerabilities, Threats, and Countermeasures,” for more information on virtu-
alization as part of security architecture and design.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   506   507   508   509   510   511   512   513   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish