10.08.2015 Views

Risico’s van een gevirtualiseerde IT-omgeving

Risico's van een gevirtualiseerde IT-omgeving - Vurore

Risico's van een gevirtualiseerde IT-omgeving - Vurore

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Risico’s</strong> <strong>van</strong> <strong>een</strong> <strong>gevirtualiseerde</strong> <strong>IT</strong>-<strong>omgeving</strong>Possen & Ulrich---------------------------------------------------------------------------------------------------------------------------IndexAppliances .................................................... 28Beschikbaarheid ............................................ 19Cluster ........................................................... 35Continuous availability ................................. 34Denial of service attack ................................. 39Disk shrinking ............................................... 41DiskWiper ..................................................... 41Integriteit ....................................................... 20iSCSI ............................................................. 50LUN .............................................................. 55Man-in-the-middle ........................................ 44NAS .............................................................. 16Near-line hot site ........................................... 34Network Time Protocol (NTP) ..................... 47Non persistent disk ........................................ 41On-line hot site .............................................. 34OTAP ............................................................ 29Promiscuous mode ........................................ 54RPO .............................................................. 34RTO .............................................................. 34SAN .............................................................. 16Service Console ............................................ 15Snapshots ...................................................... 35Vertrouwelijkheid ......................................... 20Virtual Center ............................................... 15Virtual Machines .......................................... 15Virtual Networking Layer ............................. 15Virtual Storage .............................................. 15Virtualization Layer ...................................... 14vLAN ............................................................ 16vMotion......................................................... 11x86-platformen ............................................... 9---------------------------------------------------------------------------------------------------------------------------Pagina 79

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!