Hardware,Software,and Os security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

Hardware

Physical components of a computer system (processors, memory, and storage devices).

2
New cards

Threats to Hardware systems:

1.Physical attacks: unauthorized access or theft of hardware components

2.Counterfeit Components: malicious parts in the supply chain risk hardware reliability and security.

  1. Hardware Trojans: hidden malicious circuits can leak sensitive data.

  2. Side-channel attacks: attackers exploit power consumption.

3
New cards

Security practices for hardware:

  1. Secure boot processes

  2. Trusted platform modules

  3. Hardware security keys

  4. Firmware and virtualization security

4
New cards

Software security

Protects programs and applications running on a computer system from vulnerabilities, bugs, and potential exploits.

5
New cards

Threats to software systems:

Exploitation of vulnerabilities: attackers exploit software vulnerabilities.

Malware threats.

Code injection attacks

Logic bombs

6
New cards
7
New cards
8
New cards
9
New cards
10
New cards
11
New cards
12
New cards
13
New cards
14
New cards
15
New cards
16
New cards