Question

In: Computer Science

What are Meltdown & Spectre? What are their security implication? What are the impacts of Meltdown & Spectre on the wireless networks?

What are Meltdown & Spectre? What are their security implication?

What are the impacts of Meltdown & Spectre on the wireless networks?


Solutions

Expert Solution

What are Meltdown & Spectre? What are their security implication?

Spectra and Meltdown are the names given to the vulnerability that affects the computer chips which are manufactured in the last 20 years. It allows attackers to get access to data which were supposed to be completely protected.

Meltdown is a hardware vulnerability affecting Intel 86 Microprocessors, IBM POWER Processors and some ARM based microprocessors.It allows rogue process to have unauthorized access to data.

Spectre is a vulnerability that affects modern microprocessors that perform branch prediction.

While programs are not allowed to read data from other programs, a malicious program can exploit meltdown and spectre to get hold of secrets stored in the memory of other running programs.This might include the passwords stored in password manager or browser, personal photos, emails and business-critical documents.

Meltdown and Spectre gain access to protected data by exploiting two important techniques used to speed up computer chips, called Speculative Execution and Caching.

What are the impacts of Meltdown & Spectre on the wireless networks?

Meltdown and spectre impact networking products like Application Delivery Controllers and WAN Optimization Controllers.

Java Script Code on a website to use Spectre to trick a web browser into revealing user and password information.

Attackers could exploit meltdown to view data owned by other users and other virtual servers hosted on the same hardware, which is disastrous for cloud computing hosts.


Related Solutions

Why is security so important to wireless networks? Give two examples of defense measures that should...
Why is security so important to wireless networks? Give two examples of defense measures that should be taken to enhance wireless security.
What are the impacts of food security?
What are the impacts of food security?
Wireless Sensor Networks/Internet of Things Topic Quesiton 8 In wireless network snooping is possible. What are...
Wireless Sensor Networks/Internet of Things Topic Quesiton 8 In wireless network snooping is possible. What are the positive aspects of snooping?
What is the hidden-terminal problem as it relates to CSMA in wireless sensor networks?
What is the hidden-terminal problem as it relates to CSMA in wireless sensor networks?
1) Describe what a VLAN is and how it might be important with wireless networks.     ...
1) Describe what a VLAN is and how it might be important with wireless networks.      2) Explain why packet filtering alone is inadequate as the only form of firewall.      3) Describe the role of a DMZ when talking about perimeter firewalls.      4) Describe what a “Proxy Server” is and how it is used with firewalls.      5) Explain the role of a “personal “ firewall on a corporate network where there is a robust perimeter firewall.     ...
What controls must be used to protect data that is transmitted across wireless networks?
What controls must be used to protect data that is transmitted across wireless networks?
what is your opinion on this? Should companies use wireless technology for their networks? The use...
what is your opinion on this? Should companies use wireless technology for their networks? The use of wireless technology would be useful as it can promote cost-efficient measures as wireless networks are less expensive due to fewer cables being used and it’s extremely flexible because workers can still do work while away from the office. However, there’s more of a risk of being exposed to attacks, and speeds may be significantly slower than a wired network. What limits should be...
What are two types of encryption for wireless networks? Which encryption standard is considered to be...
What are two types of encryption for wireless networks? Which encryption standard is considered to be more secure? Why? The property written in the format 00:00:00:0A:0B:0C for a device is called its ______________. Why should you disable the SSID on a wireless network? What is an evil twin attack? Why would you disable a Bluetooth device when you are in a public place? What happens when you jailbreak or root a device? What potential problems are caused by jailbreaking or...
Discover why the conventional routing in wired networks is not suitable for wireless networks? Substantiate your...
Discover why the conventional routing in wired networks is not suitable for wireless networks? Substantiate your answer with suitable examples. (20marks) Learning Outcome Demonstrate the architecture and principle of computer networks with wired and wireless communication.
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT