Question

In: Computer Science

What are Meltdown & Spectre? What are their security implication? What are the impacts of Meltdown & Spectre on the wireless networks?

What are Meltdown & Spectre? What are their security implication?

What are the impacts of Meltdown & Spectre on the wireless networks?


Solutions

Expert Solution

What are Meltdown & Spectre? What are their security implication?

Spectra and Meltdown are the names given to the vulnerability that affects the computer chips which are manufactured in the last 20 years. It allows attackers to get access to data which were supposed to be completely protected.

Meltdown is a hardware vulnerability affecting Intel 86 Microprocessors, IBM POWER Processors and some ARM based microprocessors.It allows rogue process to have unauthorized access to data.

Spectre is a vulnerability that affects modern microprocessors that perform branch prediction.

While programs are not allowed to read data from other programs, a malicious program can exploit meltdown and spectre to get hold of secrets stored in the memory of other running programs.This might include the passwords stored in password manager or browser, personal photos, emails and business-critical documents.

Meltdown and Spectre gain access to protected data by exploiting two important techniques used to speed up computer chips, called Speculative Execution and Caching.

What are the impacts of Meltdown & Spectre on the wireless networks?

Meltdown and spectre impact networking products like Application Delivery Controllers and WAN Optimization Controllers.

Java Script Code on a website to use Spectre to trick a web browser into revealing user and password information.

Attackers could exploit meltdown to view data owned by other users and other virtual servers hosted on the same hardware, which is disastrous for cloud computing hosts.


Related Solutions

Why is security so important to wireless networks? Give two examples of defense measures that should...
Why is security so important to wireless networks? Give two examples of defense measures that should be taken to enhance wireless security.
What are the impacts of food security?
What are the impacts of food security?
What is the hidden-terminal problem as it relates to CSMA in wireless sensor networks?
What is the hidden-terminal problem as it relates to CSMA in wireless sensor networks?
1) Describe what a VLAN is and how it might be important with wireless networks.     ...
1) Describe what a VLAN is and how it might be important with wireless networks.      2) Explain why packet filtering alone is inadequate as the only form of firewall.      3) Describe the role of a DMZ when talking about perimeter firewalls.      4) Describe what a “Proxy Server” is and how it is used with firewalls.      5) Explain the role of a “personal “ firewall on a corporate network where there is a robust perimeter firewall.     ...
What controls must be used to protect data that is transmitted across wireless networks?
What controls must be used to protect data that is transmitted across wireless networks?
what is your opinion on this? Should companies use wireless technology for their networks? The use...
what is your opinion on this? Should companies use wireless technology for their networks? The use of wireless technology would be useful as it can promote cost-efficient measures as wireless networks are less expensive due to fewer cables being used and it’s extremely flexible because workers can still do work while away from the office. However, there’s more of a risk of being exposed to attacks, and speeds may be significantly slower than a wired network. What limits should be...
What are two types of encryption for wireless networks? Which encryption standard is considered to be...
What are two types of encryption for wireless networks? Which encryption standard is considered to be more secure? Why? The property written in the format 00:00:00:0A:0B:0C for a device is called its ______________. Why should you disable the SSID on a wireless network? What is an evil twin attack? Why would you disable a Bluetooth device when you are in a public place? What happens when you jailbreak or root a device? What potential problems are caused by jailbreaking or...
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
True or False? Wireless ad hoc networks are distributed networks that work without fixed infrastructures and...
True or False? Wireless ad hoc networks are distributed networks that work without fixed infrastructures and in which each network node is willing to forward network packets for other network nodes. 4. True or False? WEP is designed to protect linkage-level data for wireless transmission by providing confidentiality, access control, and data integrity, to provide secure communication between a mobile device and an access point in a 802.11 wireless LAN. 5. True or False? The WPA standard is aimed at...
what is your opinion on this? Should companies use wireless technology for their networks? I think...
what is your opinion on this? Should companies use wireless technology for their networks? I think companies should use wireless technology as long as it is secure. Increased mobility can help with productivity. If an employee has to visit another work site (or home), they can still access the company network from anywhere. We're literally seeing this in real time with the pandemic. I think increased communication is the second biggest reason. Being able to communicate with coworkers anywhere to...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT