virtualization and associated security vulnerabilities

 Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.   

With at least 3 references and 3 inline citations (APA)

Tags: No tags