KEMBAR78
Docker | PDF | Art | Computers
0% found this document useful (0 votes)
75 views8 pages

Docker

Docker is software that allows applications to be packaged and run in isolated containers to improve development and delivery of software. Containers use operating system-level virtualization instead of hardware virtualization used by virtual machines. While containers provide isolation, there are security threats including kernel exploits that could compromise the entire host if a container is hacked, as well as denial-of-service attacks if containers consume too many system resources.

Uploaded by

Vivek Sinha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views8 pages

Docker

Docker is software that allows applications to be packaged and run in isolated containers to improve development and delivery of software. Containers use operating system-level virtualization instead of hardware virtualization used by virtual machines. While containers provide isolation, there are security threats including kernel exploits that could compromise the entire host if a container is hacked, as well as denial-of-service attacks if containers consume too many system resources.

Uploaded by

Vivek Sinha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
You are on page 1/ 8

MicroServices....

Definition

Docker is a collection of inter-operating software-


as-a-service and platform-as-a-service offerings
that employ operating-system-level virtualization
to cultivate development and delivery of software
inside standardized software packages called
containers. The software that hosts the
containers is called Docker Engine
Comparison with VMs
Architecture
Tutorial
Use Cases
Threats

Kernel exploits: Since the host’s kernel is shared in the container,


a compromised container can attack the entire host.



Container breakouts: Caused when the user is able to escape the
container namespace and interact with other processes on the
host.
Denial-of-service attacks: Occur when some containers take up

enough resources to hamper the functioning of other applications.



Poisoned images: Caused when an untrusted image is being run
and a hacker is able to access application data and, potentially,
the host itself.
Q&A

You might also like