This computer security diagram example was designed on the base of the Wikimedia Commons file: Diagramme ArchiIsolateur.png.
"Virtualization, architecture of an isolator."
[commons.wikimedia.org/wiki/File:Diagramme_ArchiIsolateur.png]
This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license. [creativecommons.org/licenses/by-sa/3.0/deed.en]
"In computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, operating systems, storage devices, and computer network resources." [Virtualization. Wikipedia]
The cybersecurity diagram example "Isolator architecture" was created using the ConceprDraw PRO software extended with the Network Security Diagrams solution from the Computer and Neworks area of ConceptDraw Solution Park.