magistrsko delo
Luka Škerjanec (Author), Marko Hölbl (Mentor)

Abstract

Tehnologije virtualizacije se delijo na virtualne naprave in vsebniške tehnologije, vse pa rešujejo različne probleme pri postavljanju in konfiguraciji okolij za gostovanje programske opreme, ki se uporabljajo v različnih fazah razvoja in uporabe različnih storitev. Vloga virtualnih tehnologij je enostavna in hitra konfiguracija različnih operacijskih sistemov, ki se izvajajo na istem fizičnem strežniku. Predstavili smo prednosti in slabosti posamezne tehnologije ter raziskali varnostne aspekte, ki jih moramo nasloviti pri uporabi virtualnih tehnologij. Raziskali smo varnostne mehanizme, ki jih uporabljajo vsebniške tehnologije Docker, njihovo privzeto konfiguracijo ter dodatne načine konfiguracije za prilagoditev glede na posameznikove zahteve. Poiskali in pregledali smo preventivne ukrepe za zmanjšanje varnostnih tveganj ter pregledali uporabo orodij za analiziranje in pregled trenutnega stanja varnosti na okolju, kjer uporabljamo vsebniške tehnologije Docker.

Keywords

tehnologije virtualizacije;vsebniki;vsebnik Docker;varnost tehnologij;magistrske naloge;

Data

Language: Slovenian
Year of publishing:
Typology: 2.09 - Master's Thesis
Organization: UM FERI - Faculty of Electrical Engineering and Computer Science
Publisher: [L. Škerjanec]
UDC: 004.946.056(043.2)
COBISS: 39513859 Link will open in a new window
Views: 310
Downloads: 44
Average score: 0 (0 votes)
Metadata: JSON JSON-RDF JSON-LD TURTLE N-TRIPLES XML RDFA MICRODATA DC-XML DC-RDF RDF

Other data

Secondary language: English
Secondary title: Security analysis of container technology Docker
Secondary abstract: Virtual technologies are divided into virtual devices and content technologies, which solve various problems in setting up and configuring software hosting environments used in different stages of developing and using different services. The role of virtual technologies is to enable simple and rapid configuration of different operating systems running on the same physical server. We outlined the strengths and weaknesses of each technology and explored the security aspects we need to address when using virtual technologies. We investigated the security mechanisms used by Docker container technologies, their default configuration, and additional configuration methods to customize according to individual requirements. We have identified and reviewed preventative measures to reduce security risks and reviewed tools to analyze and review the current state of security in an environment where Docker container technologies are being used.
Secondary keywords: Virtual technologies;containers;Docker;security;OWASP;
Type (COBISS): Master's thesis/paper
Thesis comment: Univ. v Mariboru, Fak. za elektrotehniko, računalništvo in informatiko, Informatika in tehnologije komuniciranja
Pages: VI, 71 f.
ID: 11964469