About: Hypervisor attack   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

In a hypervisor attack, the attacker tries to attack the hypervisor directly. The hypervisor, which is often a stripped-down operating system, has direct access to the system hardware, and it brokers all access between the various virtualized systems and the hardware devices. If the hypervisor can be compromised, then the attacker may be able to compromise any or all of the virtualized systems controlled by that hypervisor.

AttributesValues
rdfs:label
  • Hypervisor attack
rdfs:comment
  • In a hypervisor attack, the attacker tries to attack the hypervisor directly. The hypervisor, which is often a stripped-down operating system, has direct access to the system hardware, and it brokers all access between the various virtualized systems and the hardware devices. If the hypervisor can be compromised, then the attacker may be able to compromise any or all of the virtualized systems controlled by that hypervisor.
dcterms:subject
abstract
  • In a hypervisor attack, the attacker tries to attack the hypervisor directly. The hypervisor, which is often a stripped-down operating system, has direct access to the system hardware, and it brokers all access between the various virtualized systems and the hardware devices. If the hypervisor can be compromised, then the attacker may be able to compromise any or all of the virtualized systems controlled by that hypervisor.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software