Data Leakage Protection

Authors

  • Ziyad Ahmed Mohammed, Arshpreet Singh, Manan Rajiv Sahni, Abdul Moid Khan Mohammed, Syed Suhaib Hussain, Mohammad Abdul Malik Fazal

Abstract

Applications run businesses.They have become so crucial that it is almost impossible to imagine an organization running without them. Applications run on servers and if we look almost 2 decades back we would require a physical server to run them , but the issue with that was the size and speedĀ  of the server required is unpredictable buying a huge server only to utilize 5-10% of its capabilities was just a waste of capital , thus the concept of virtualization came to be it enables tones of apps to run on the same physical server. Consider virtual machine as a slice of physical hardware , so all has the portion of the cpu , memory and disk space.The came the concept of containers they are very similar to a Vm but with one major difference THE HOST OPERATING SYSTEM. Docker is a software platform for developers and sysadmins to deploy , develop and run apps with containers.Now using this helped utilize the resources more efficiently but there at times were security holes in container configurations that could lead to compromised situations.

Downloads

Published

2022-05-17