Protecting-Tele-Lab-attack-vectors-and-countermeasures-for-a-remote-virtual-IT-security-lab