Question

In: Computer Science

Scan the articles to identify 3 patches recently made to operating systems or software applications for...

  • Scan the articles to identify 3 patches recently made to operating systems or software applications for mobile devices. Create a list of software vendors and the number of patches applied by each over the past year.

Solutions

Expert Solution

Patch 1: There was a possiblility to agree to the Terms and Conditions without authentication of the user. It was of low severety threat which was reported in march 2020. The patch blocked the authentication bypass and the threat was mitigated.

Patch 2: It was made possible for any sensitive data to be leaked from Auto Hotspot mode. It was of very high threat which was reported in april 2020. The patch modified the data saving methodology of content provider to block the threat.

Patch 3: There was a case of Buffer overflow vulnerability in with the technical fault in abnormal setup message. It was a critical threat reported in june 2020 and was privately disclosed. It was caused due to buffer overflow in baseband which allowed random code execution in exynos chip mobile devices of samsung. the patch included the validation check for buffer length before write into buffer to check the overflow.

List of software vendors and number of vulnerabilities fixed by patches and security updates:

Vendors/ Software publisher Patches fixed
Adobe 2052
Microsoft 2143
Google 1040
Apple 968
Cisco 388
Oracle 568

Reference: Syxsense.com


Related Solutions

OPERATING SYSTEMS HOMEWORK: PLEASE CODE IN JAVA with comments & POST SCREENSHOTS OF OUTPUTS SCAN This...
OPERATING SYSTEMS HOMEWORK: PLEASE CODE IN JAVA with comments & POST SCREENSHOTS OF OUTPUTS SCAN This algorithm is performed by moving the R/W head back-and-forth to the innermost and outermost track. As it scans the tracks from end to end, it process all the requests found in the direction it is headed. This will ensure that all track requests, whether in the outermost, middle or innermost location, will be traversed by the access arm thereby finding all the requests. This...
Discuss the main benefits of deploying QNX Operating Systems for applications.
Discuss the main benefits of deploying QNX Operating Systems for applications.
Answer the following questions a) 3 applications of transforming of laplace. b) 3 systems of linear...
Answer the following questions a) 3 applications of transforming of laplace. b) 3 systems of linear equations applied in electronic engineering or mechatronic engineering.
Identify and discuss at least 3 weaknesses in the Articles of Confederation. Discuss the event that...
Identify and discuss at least 3 weaknesses in the Articles of Confederation. Discuss the event that took place in 1786 that showed the nation that the Articles were too weak to be the National Constitution.
Explain the purpose and relationships between communications protocols, Server hardware,operating systems and web server software with...
Explain the purpose and relationships between communications protocols, Server hardware,operating systems and web server software with regards to designing, publishing and accessing a website?
Read at least three (3) academically reviewed articles on Management Information Systems and Summarize all three...
Read at least three (3) academically reviewed articles on Management Information Systems and Summarize all three (3) articles in 300 words or more. Please use your own words. Do not copy-and-paste. Also discuss at least 3 different concepts presented in the articles.
Introduction to Management Information Systems Read at least three (3) academically reviewed articles on Management Information...
Introduction to Management Information Systems Read at least three (3) academically reviewed articles on Management Information Systems and complete the following activities: (Wikipedia articles will not be accepted. Professor will check originality of all posts). 1. Summarize all three (3) articles in 300 words or more. Please use your own words. No copy-and-paste 2. Discuss at least 3 different concepts presented in the articles. As an IT professional, how would you apply the three (3) concepts you identified. Please use...
1. Gamebox, a seller of video-gaming systems, games and online gaming subscriptions, recently made available a...
1. Gamebox, a seller of video-gaming systems, games and online gaming subscriptions, recently made available a coupon that allows its gaming subscription members to extend their subscriptions by three months at no charge. Subscribers need only to login to the website using their user name and password and provide the coupon code. Because this contract modification (from 12 months to 15 months) does not add distinct goods or services from the original contract, Gamebox need only make a cumulative catch-up...
The purpose of this exercise is to successfully identify and describe in detail 3 database systems...
The purpose of this exercise is to successfully identify and describe in detail 3 database systems that you or someone you are close to encounters often for their normal day-to-day activities. When considering database systems to describe, consider the points listed below: 1. What is the database system identified? Remember to keep it broad (e.g. our accounting system) 2. Where would you typically see such a database system used? 3. Why does this database system exist? What problem is being...
The purpose of this exercise is to successfully identify and describe in detail 3 database systems...
The purpose of this exercise is to successfully identify and describe in detail 3 database systems that you or someone you are close to encounters often for their normal day-to-day activities. When considering database systems to describe, consider the points listed below: 1. What is the database system identified? Remember to keep it broad (e.g. our accounting system) 2. Where would you typically see such a database system used? 3. Why does this database system exist? What problem is being...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT