Identify at least 3 different processes or procedures that can be used to address operating system security issues in a distributed environment.
Identify at least 3 different processes or procedures that can be used to address operating system security issues in a distributed environment. Discuss the advantages and disadvantages of virtualization in a data center environment.