A virtual server or virtual private server (VPS) is a fully-fledged server with its own operating system and well-defined hardware features only that unlike a classic server it shares physical resources with other virtual machines in this way more VPS can be run simultaneously on the same server (hypervisor).
This virtualization technique allows significant cost savings and an optimization of hardware resources as it is possible to run multiple operating systems on the same hardware.
Virtual server – Pros/Cons
♦ Migration: It is possible to “move” (migrate) a VPS from one server (hypervisor) to another (even without interruption of service).
Example: You have created a VPS on a hypervisor in Italy and you want to move it to a server in America. With a VPS, as long as the Cloud Provider has another Datacenter in America, this can be done quickly.
♦ Scalability: It is the possibility of increasing or decreasing the hardware resources (CPU, RAM, Disk, etc) without rebuilding the VPS and in some cases without restarting it in full transparency to users who use the services provided.
Example: A VPS of 2 cores, 1 GB of RAM and 20 GB of disk has been created but after a few months we realize that the RAM memory is insufficient for the services provided and it is necessary to increase it. With a VPS it is very easy to solve this problem, just increase the RAM from the configuration panel and the new configuration will be applied (in the case of linux systems without the need to reboot).
♦ Autoscaling: It is the possibility to increase or decrease the resources (scaling) automatically according to well defined hardware policies. This technique is extremely valid in cases of load peaks.
Example: A VPS has been created with 2 cores, 1 GB of RAM and 20 GB but in some periods of the year due to the high user access these resources are not sufficient, then in this case it is possible to configure these policies:
a) If the CPU is at 90% for more than 1h then the CPU of a core increases every 30min for a maximum of 6 cores and then if the CPU is less than 10% for more than 1h decrease the CPU of a core every 30 min up to a minimum of 2 cores.
b) If the RAM is 99% for more than 1h then increase the RAM of 1Gb every 30min for a maximum of 32Gb and then if the RAM is less than 50% for more than 1h decrease the RAM of a core every 30 min until at a minimum of 1Gb.
♦ Low cost: by comparing the cost of a VPS to that of a fiscal server like hardware resources, the cost of a VPS is much lower, especially considering that some cost items are already included in the VPS fee. :
a) Energy consumption;
b) Internet band;
c) Cost of public IP addresses;
d) Costs related to housing (cooling, surveillance, etc);
f) Technical assistance.
♦ Shared resources: Depending on the configurations and characteristics of the Cloud Provider, some hardware resources, such as the CPU, could be shared so performance may be lower than a physical server. This condition is not always true as it is possible to request a 100% allocation on all hardware resources to your Cloud Provider.
Virtual server – Limits:
- ♦ OS Virtualization: Not all operating systems and platforms can be virtualized (Eg AS400, Apple OS).
- ♦ Band: Although this is not an inherent problem of virtualization itself there could be latency differences in the Internet connection between a physical server in the company and a VPS if users are predominantly within the company and if the company has not an adequate Internet line.
Example: A physical server in the customer’s DMZ is accessed by its LAN users via a 10Gb line, if the server is virtualized and becomes a VPS at a Cloud provider, access to it is transmitted via the client’s Internet line which may be more slow.
Virtual server – False myths
- ♦ A VPS does not have the same performance as a physical server: By allocating 100% of the physical resources and correctly dimensioning a VPS the latter has nothing to envy to a physical server from a performance point of view.
- ♦ A VPS is less secure than a physical server: A VPS can have the same degree of security as a physical server because it is possible to adopt the same security measures (Firewall, Antivirus, Hardening, VPN) applicable to a Fiscal server.
Check out the Cloud Server
- Hadoop Open Data Model: “open” data collection
- Pass the Ticket: how to mitigate it with a SOCaaS
- Use cases of a SOCaaS for companies part 2
- Use cases of a SOCaaS for companies part 1
- NIST Cybersecurity Framework
- “Left of boom” and “right of boom”: having a winning strategy
- Smishing: a fraud similar to phishing
- Network Traffic Analyzer: an extra gear for the Next Gen SIEM
- Backup as a Service (2)
- Cloud Conference (3)
- Cloud CRM (1)
- Cloud Server/VPS (20)
- Conferenza Cloud (4)
- ICT Monitoring (4)
- Log Management (2)
- News (18)
- ownCloud (4)
- Privacy (7)
- Secure Online Desktop (14)
- Security (14)
- Web Hosting (15)
- FragAttacks Foil 2 Decades of Wireless Security August 6, 2021Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks.
- Researchers Call for 'CVE' Approach for Cloud Vulnerabilities August 6, 2021New research suggests isolation among cloud customer accounts may not be a given -- and the researchers behind the findings issue a call to action for cloud security.
- HTTP/2 Implementation Errors Exposing Websites to Serious Risks August 6, 2021Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.
- CISA Launches JCDC, the Joint Cyber Defense Collaborative August 6, 2021"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
- Incident Responders Explore Microsoft 365 Attacks in the Wild August 5, 2021Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
- Researchers Find Significant Vulnerabilities in macOS Privacy Protections August 5, 2021Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
- A New Approach to Securing Authentication Systems' Core Secrets August 5, 2021Researchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.
- Organizations Still Struggle to Hire & Retain Infosec Employees: Report August 5, 2021Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
- Why Supply Chain Attacks Are Destined to Escalate August 5, 2021In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part to thwart the fallout of software supply chain compromises.
- New Normal Demands New Security Leadership Structure August 2, 2021At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.
- APPLE-SA-2021-09-13-5 Safari 14.1.2 September 17, 2021Posted by Apple Product Security via Fulldisclosure on Sep 17APPLE-SA-2021-09-13-5 Safari 14.1.2 Safari 14.1.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212808. WebKit Available for: macOS Catalina and macOS Mojave Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that […]
- APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina September 17, 2021Posted by Apple Product Security via Fulldisclosure on Sep 17APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina Security Update 2021-005 Catalina addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212805. CoreGraphics Available for: macOS Catalina Impact: Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report […]
- APPLE-SA-2021-09-13-3 macOS Big Sur 11.6 September 17, 2021Posted by Apple Product Security via Fulldisclosure on Sep 17APPLE-SA-2021-09-13-3 macOS Big Sur 11.6 macOS Big Sur 11.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212804. CoreGraphics Available for: macOS Big Sur Impact: Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a […]
- APPLE-SA-2021-09-13-2 watchOS 7.6.2 September 17, 2021Posted by Apple Product Security via Fulldisclosure on Sep 17APPLE-SA-2021-09-13-2 watchOS 7.6.2 watchOS 7.6.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212806. CoreGraphics Available for: Apple Watch Series 3 and later Impact: Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report […]
- APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8 September 17, 2021Posted by Apple Product Security via Fulldisclosure on Sep 17APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8 iOS 14.8 and iPadOS 14.8 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212807. CoreGraphics Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, […]
- AMD Chipset Driver Information Disclosure Vulnerability [CVE-2021-26333] September 17, 2021Posted by disclosure on Sep 17We recently discovered a critical information disclosure vulnerability that affected the AMD Platform Security Processor (PSP) chipset driver for multiple CPU architectures. The vulnerability allowed non-privileged users to read uninitialised physical memory pages, where the original data was either moved or paged out. https://zeroperil.co.uk/cve-2021-26333/ Regards, Kyriakos Economou | Co-Founder kye […]
- Microsoft Windows Command-line Interpreter "cmd.exe" / Stack Buffer Overflow September 17, 2021Posted by hyp3rlinx on Sep 17[+] Credits: John Page (aka hyp3rlinx, malvuln) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-WINDOWS-CMD.EXE-STACK-BUFFER-OVERFLOW.txt [+] twitter.com/hyp3rlinx [+] ISR: ApparitionSec [Vendor] www.microsoft.com [Product] cmd.exe is the default command-line interpreter for the OS/2, eComStation, ArcaOS, Microsoft Windows (Windows NT family and Windows CE family), and ReactOS operating...
- Backdoor.Win32.WinterLove.i / Hardcoded Weak Password September 14, 2021Posted by malvuln on Sep 14Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/c6c81e8ba0a7b9da6216a78dfeccec8d.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.WinterLove.i Vulnerability: Hardcoded Weak Password Description: The WinterLove malware requires authentication for remote user access. However, the password "plunix" is weak and hardcoded in plaintext within the...
- Backdoor.Win32.Wollf.h / Unauthenticated Remote Command Execution September 14, 2021Posted by malvuln on Sep 14Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/d0fd60516d53b2ad602c460351dbaa85.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Wollf.h Vulnerability: Unauthenticated Remote Command Execution Description: The malware listens on TCP port 7614 installs a service named WRM. Third-party attackers who can reach the system can get a shell with […]
- Backdoor.Win32.VB.awm / Authentication Bypass - Information Leakage September 14, 2021Posted by malvuln on Sep 14Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/2271d942a23a89d7adea524d4ac3c13f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.VB.awm Vulnerability: Authentication Bypass - Information Leakage Description: The "Cryptech Heat" malware listens on TCP port 3786 and has an option to set an remote access password. The malware also runs […]
Estimated reading time: 7 minutes Il vishing è una particolare tipologia di phishing che sfrutta la tecnologia Vo… https://t.co/q9OO03jSHj
Estimated reading time: 5 minutes Come abbiamo già affrontato precedentemente negli scorsi articoli, i ransomware… https://t.co/O8xUUJocYc
Estimated reading time: 6 minutes Il Database Activity Monitoring (DAM) è una tecnologia applicata alla sicurezza… https://t.co/juh8ZBKMqP
Estimated reading time: 6 minutes I continui progressi in ambito di automazione della sicurezza informatica hanno… https://t.co/mPc4yUpVf8
Estimated reading time: 5 minutes Nell’articolo precedente abbiamo visto i più comuni casi d’uso di un SOCaaS, sp… https://t.co/MvxAKo6Zey