logo

cyber Attack presentation 2022

   

Added on  2022-08-13

11 Pages796 Words49 Views
 | 
 | 
 | 
C Y B E R S E C U R I T Y :
M E L T D O W N A N D
S P E C T R E
V U L N E R A B I L I T I E
S
N A M E O F T H E S T U D E N T
N A M E O F T H E U N I V E R S I T Y
cyber Attack presentation 2022_1

INTRODUCTION:
Generally the cyber attacks aimed at changing,
accessing as well as destroying the data and
information that are confidential or interruption in the
normal business process [1]. A successful approach of
cyber security is comprising of various protection
layers that are spread across the data, systems and
networks.
One of the significant and popular type of
vulnerabilities is meltdown and spectre which could be
extremely vulnerable for a business or organisation.
cyber Attack presentation 2022_2

MELTDOWN AND
SPECTRE
VULNERABILITIES: The vulnerabilities and threats of cyber security are
having responsibility for conduction attacks on the
network, data and systems for gaining any types of
unauthenticated and unauthorized accessibility,
damages, disruption as well as stealing the IT assets,
computer networks and intellectual properties [2].
Meltdown and Spectre is one of the specific hardware
related vulnerabilities that affects IBM POWER
processor, ARM based micro processor and Intel x86
microprocessor. It can enable a rough process to read
all of the various systems at the time of discloser [3].
cyber Attack presentation 2022_3

CONTD.
Different procedure are there to help in protecting
the host computers and other associated devices
from Meltdown and Spectre vulnerabilities. The
patches of Meltdown are having responsibility for
producing performance loss [4].
The patches of Spectre are being reported for the
purpose of reducing performance. Basically on the
old systems as well as in the 8th gen core
platforms [5].
cyber Attack presentation 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COIT 20246 Assignment Submission
|9
|3329
|56

Working of Meltdown and Spectre Exploits
|9
|4028
|491

Meltdown and Spectre - Assignment PDF
|17
|4531
|107

Explanation of Meltdown and Spectre Vulnerabilities
|11
|3042
|21

Spectre and Meltdown vulnerability
|16
|4298
|33

CO4509 – Computer Security
|13
|3355
|62