HW 8th Cases
HW 8th Cases
HW 8th Cases
Answer:
Meltdown and Spectre are information leakage vulnerabilities as
opposed to code execution vulnerabilities.
Meltdown and Spectre are the two type of flaws which leads the
attackers to access the most secure data. Meltdown was named
because it softens the security boundaries normally enforced by
hardware. By exploiting the attacker can use a program running on a
computer to gain access to the data from all over the machine that the
program shouldn't be normally able to see, including the that belongs
to other program and data to which only the administrator has the
access.
Answer:
Spectre and meltdown pose threats to all three. With cloud computing
services, they are able to gain access to tons of files, wreaking endless
havoc on potentially multiple firms, and gaining tons of sensitive
information and god knows what else. With corporate data centers,
they are able to gain all of a firm’s sensitive information such as
employee pay, social security numbers, band numbers, etc. Really
anything is possibly with these hacking systems. And finally with
individual computer and smartphone users, they can again gain your
personal information without even being detected at all. These hackers,
no matter where you are or who you are, are able to gain any
information they want just because of a flaw in the hardware of many
systems.
Answer:
First, I would start by doing any updates my operating system may need
to help prevent spectre and meltdown from accessing any information
or even start their operations. I would always keep an up to date
browser, as well as make sure that my browser is closed out when I am
done using any devices to help prevent these systems from gaining
access. And I would also look to see if there were any antivirus
applications available to help as well. These steps would go for any
situation. There is lots of sensitive information on any system, and It is
crazy to me to know that for the past 24 years, millions of devices could
have been compromised due to a flaw in computer chip hardware.
Hopefully these new processors come out sooner than the expected
510 years so people with any sort of computer down have to worry
about these types of systems or hackers in general.
Answers:
• Digital data are vulnerable to destruction, misuse, error, fraud,
and hardware or software failures. Because everything is online
today it relies on the internet to work the way it should. If it is not
working in the correct way, then information cannot be stored.
Also, people using this software need to be trustworthy because
the can often misuse the information and continue with fraud and
benefit from their misuse of the data.
• Malware is a malicious software programs such as computer
viruses, worms, and Trojan horses. A virus attaches itself to other
software programs, usually without knowledge or permission.
Worms copy themselves from one computer to another over a
network. A Trojan horse appears to be benign but then does
something other than expected.