In: Computer Science
Talking about "Cybersecurity Essentials" by Charles J. Brooks; Philip R. Craig; Donald Short. Publisher: Sybex, Year: 2018, especially CHapter 4 & Ch-5 ONLY... Will you please describe in detail the hardware and software used in those chapter (4&5 only)?
Following are the hardware which are used in the chapter 4 and 5 of the book.
Hardware Used:
1. Hardware assisted Virtualization: This type of virtualization contains the dedicated hardware in order to run the virtual environment thus the speed of the virtual machines too good, and the processes done are efficient in nature.
2. CoreRESTORE: It acts as the interface between drive electronics and hard-drives. This prevents system from making any changes onto the disk but it will return in such a way that someone has already made the change.
Software Used:
1. Hypervisors: These are software which are used when there are calls to be made from the hardware so this is the software which will simulate the hardware environment for the virtual environment created.
2. Spyware: These are the software which are malicious in nature and can disturb the victim. These are the software which are meant to keep an unwanted eye on their work.