1/15
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Hardware
Physical components of a computer system (processors, memory, and storage devices).
Threats to Hardware systems:
1.Physical attacks: unauthorized access or theft of hardware components
2.Counterfeit Components: malicious parts in the supply chain risk hardware reliability and security.
Hardware Trojans: hidden malicious circuits can leak sensitive data.
Side-channel attacks: attackers exploit power consumption.
Security practices for hardware:
Secure boot processes
Trusted platform modules
Hardware security keys
Firmware and virtualization security
Software security
Protects programs and applications running on a computer system from vulnerabilities, bugs, and potential exploits.
Threats to software systems:
Exploitation of vulnerabilities: attackers exploit software vulnerabilities.
Malware threats.
Code injection attacks
Logic bombs