logo

Explanation of Meltdown and Spectre Vulnerabilities

   

Added on  2022-08-26

11 Pages3042 Words21 Views
Running head: CYBERSECURITY
Cyber Security: Meltdown and Spectre Vulnerabilities
Name of the Student
Name of the University
Author’s Note:

1
CYBERSECURITY
Table of Contents
1. Introduction............................................................................................................................2
2. Discussion..............................................................................................................................2
2.1 Explanation of Meltdown and Spectre Vulnerabilities....................................................2
2.2 Examples of the Vulnerabilities with Probable Solutions to eradicate them...................5
3. Conclusion..............................................................................................................................7
References..................................................................................................................................9

2
CYBERSECURITY
1. Introduction
Cybersecurity can be referred to the subsequent practice to protect different system,
network as well as a program from digitalized attack [1]. Such distinct cyber attacks are
generally aimed at accessing, altering and even manipulating confidential data or subsequent
interruption of the usual business procedures. Successful deployment of an efficient measure
for cybersecurity is highly challenging since there exist numerous devices, in comparison to
the individuals and the attackers are eventually becoming more creative. A successful
approach for cybersecurity ultimately consists of different protection layers that are being
spread across the systems, datum and network that one intends to keep safe.
The subsequent technologies, processes and people in a company are required to be
saved after creating an effective defence from the cyber attacks. There are several types of
vulnerabilities present in the cyber world, which are responsible for bringing significant
issues in the systems and processes [2]. One of such famous and considerable type of
vulnerability is Meltdown and Spectre that could be extremely vulnerable for the organization
and business. The following report will be outlining a detailed analysis of the meltdown and
spectre vulnerabilities with proper examples and suitable solutions for these threats.
2. Discussion
2.1 Explanation of Meltdown and Spectre Vulnerabilities
Cybersecurity threats and vulnerabilities are responsible for conducting attacks on
systems, networks and data for the core purpose of gaining any type of unauthorized and
unauthenticated accessibility, disruption, damages and stealing the asset of information
technology assets, intellectual properties and computer networks and other forms of
confidential data [3]. These cybersecurity vulnerabilities are required to be eradicated on time
so that maximum advantages are gained, and the respective assets and resources are secured

3
CYBERSECURITY
eventually. The most common examples of cyber threats include malware, spyware phishing
attack, distributed denial of service attacks, ransomware, zero-day exploits, advanced level
persistent threats, Trojan horses, wiper attacks, theft of intellectual properties, data
destruction, manipulation of data, man in the middle attacks, rogue software, unpatched
software and many more. These risks are present in almost every company and are not always
under the direct control of the IT security team. The increasing globalized connection and
utilization of cloud services are the reasons for the more significant attack vector and are
needed to be attended on a priority basis.
Meltdown and Spectre are a specific hardware vulnerabilities that affect the Intel x86
microprocessor, few of the ARM-based microprocessor and IBM POWER processor [4].
This particular vulnerability enables a rogue procedure for reading all memory and when it is
not being authenticated for doing so. It also impacts a wider variety of a system. During the
time of revelation, it involves every device running, however with the latest as well as
patched version of iOS as well as macOS, Linux and Windows. Several servers or different
cloud services are being afected to understand the potential majority of the smart device and
even implanted device with the help of ARM-based processor like smart TV, mobile device
and printer [5]. It also includes a wider variety of different networking apparatus.
A good software workaround to this Meltdown was being evaluated as the slowing
systems within 5% and 30% in few focussed working loads, even though the organizations
are responsible for correcting the exploitation with minimal effect from the generalized
benchmark testing [6]. It is referred to as one of the major and the most significant
vulnerability type, which has become quite common in recent days. Meltdown was eventually
issued a CVE ID of CVE 2017 5754 in January 2018. It is also referred to as Rogue Data
Cache Load or RDCL that was revealed in the subsequent conjunction with the other
exploitation, called Spectre with which it eventually segments few of the significant features.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
cyber Attack presentation 2022
|11
|796
|49

Meltdown and Spectre - Assignment PDF
|17
|4531
|107

Meltdown and Spectre Assignment PDF
|16
|4130
|63

Computer Security Assignment (Solved)
|16
|3997
|46

Cybersecurity Risks and Recommendations for ABCT
|13
|3833
|55

Impact of External Environment on Cyber Security in Hospitality Industry
|4
|589
|318