logo

Spectre and Meltdown vulnerability

   

Added on  2021-04-21

16 Pages4298 Words33 Views
 | 
 | 
 | 
Running head: SPECTRE AND MELTDOWN VULNERABILITIESSpectre and Meltdown VulnerabilitiesName of the Student:Name of the University:Author note
Spectre and Meltdown vulnerability_1

1SPECTRE AND MELTDOWN VULNERABILITIESExecutive SummaryThe purpose of the paper is to identify the Spectre and Meltdown vulnerability. The paperalso identifies the procedure in which the vulnerabilities progress. The article also provides abrief overview of the impacts of the vulnerabilities and the extent of its spread in themicroprocessor. It also provides the counter measures to the spectre and the meltdownattacks. Finally, the paper provides the future impact on the system configuration.
Spectre and Meltdown vulnerability_2

2SPECTRE AND MELTDOWN VULNERABILITIESTable of ContentsIntroduction................................................................................................................................3Spectre Vulnerability.................................................................................................................4Meltdown Vulnerability.............................................................................................................5Counter measures to the Spectre and Meltdown Vulnerabilities...............................................6Mitigations for the Spectre Vulnerabilities............................................................................6Mitigations for the Meltdown Vulnerabilities........................................................................8Future Impact of Spectre and Meltdown vulnerability..............................................................9Conclusion................................................................................................................................10References................................................................................................................................12
Spectre and Meltdown vulnerability_3

3SPECTRE AND MELTDOWN VULNERABILITIESIntroductionComputer security, sometimes also known as Cyber Security is the activities or theprocess by virtue of which the computer systems is protected against damage and threat to thecomputer hardware as well as software (Bambauer 2013). Computer security secures thecomputer system by disallowing the threats that peep into the computer system throughnetwork access, code and data injection. The field of computer security needs utmostattention as with the growing technologies and increased internet connections leads to theincrement is issues of cyber attack as well as data breaches across the network (Hsiao et al.,2014). The spectre and Meltdown vulnerabilities are the vulnerabilities that attack thecomputer system. The paper brings to light the major vulnerabilities to the computer systemnamely Spectre and Meltdown vulnerabilities. The paper provides a brief overview of theprocedure of the Spectre and Meltdown attack. The article clearly points out the fact thatthese vulnerabilities affect the computer at the processor level. The article also points out theimpacts of the Spectre and Meltdown vulnerabilities. Furthermore, the paper brings to lightthat these vulnerabilities have a wide spread affect, including all the processors available inthe market. The paper also describes the techniques to mitigate the risks imparted by thesevulnerabilities. The article also describes the procedure through which the mitigationtechniques should be implemented in order to curb down the risks imparted by the Spectreand Meltdown vulnerabilities. Finally, the paper provides the future implications of theSpectre and the Meltdown vulnerabilities. The article also highlights that the changesimplemented in the future processors such that these vulnerabilities could be mitigated.Various changes implemented in the operating system, help to curb down the risksincorporated by the Spectre and Meltdown vulnerabilities. The mitigation of such risks is
Spectre and Meltdown vulnerability_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security Maintenance
|15
|4076
|48

cyber Attack presentation 2022
|11
|796
|49

The Meltdown and Spectre Assignment
|17
|4180
|48

Explanation of Meltdown and Spectre Vulnerabilities
|11
|3042
|21

Meltdown and Spectre - Assignment PDF
|17
|4531
|107

Meltdown and Spectre Assignment PDF
|16
|4130
|63