Second International Conference on Advances in Computing, Electronics and Communication - ACEC 2014
Author(s) : DHARI KH ABEDULA
In this paper , I will examine the Security design parts of the University Technology Malaysia UTM Virtual LAB environment , beginning with the security areas and requirements that guided the creation and evolution of the LAB project . In addition, design Guides provide an overview of the Security solutions architecture and Scenarios. with Security traffic across the Security server through the internet , with Active Directory server to provide the Authentication methodology, and data protection provide backups with checkpoint and rollback mechanisms.