Professional Documents
Culture Documents
Network Security Assgnment
Network Security Assgnment
Chips from Intel, AMD, and ARM are susceptible to Spectre attacks. Intel processor have security issues
like security bugs that are fixed but after fixing of bugs it could slow down pc’s. On the other hand
Kernels in operating system have complete control over the entire system and connect applications to
the processor memory and all other hardware that are inside the computers.
Intel chips
In the Intel chips have been marred by another series of security flaws dubbed Foreshadow-NG.
Researchers discovered the vulnerabilities, which primarily affect Intel’s Software Guard Extensions
(SGX) and the security of virtualized environments.
Foreshadow is yet another speculative execution flaw such as like Meltdown and Spectre that are occurs
in Intel’s processors that allows attackers to steal sensitive contents stored in computers easily or virtual
machines' memory. Most modern processors utilize speculative execution to improve performance. As the
name suggests, the chips will speculate or assume the instructions they need to execute next, instead of
waiting around for the previous instructions to complete their execution. When the prediction is correct,
this saves overall execution time, while the incorrect predictions are scrapped and loss a lot of time.
Intel Core X-series processor family for Intel X99 and X299 platforms
Researchers discovered gaps in security stemming from central processing units - better known as the
chip or microchip - which could allow privately stored data in computers and networks to be hacked.
What are the bugs?
There are two type of separate security risk flaws in the Computer system and Laptop’s, which are known
as Meltdown and Spectre.
Meltdown affects laptops, desktop computers and internet servers with Intel chips.
Spectre potentially has a wider reach. It affects some chips in smartphones, tablets and computers
powered by Intel, ARM and AMD.
Basically in simple words you can say that the bugs are security risk or security flaws that are allow
hackers to potentially read information stored on a computer memory and steal information of personal
data of companies that can be protected for unauthorized peoples like passwords, pictures, and credit card
data information.
Another big new by the Researcher and Technology analyst Jake Saunders from ABI Research said it was
not exactly clear what information might be at risk, but as the security gaps had been exposed "the
question is whether other parties can discover and potentially exploit them".
1. Access control
2. Authentication
3. Non – repudiation
4. Data consistency
5. Communication security
6. Data integrity
7. Availability
8. Privacy
RFC 4949
The RFC 4949 is an Internet Security Glossary Version 2 that is released in August 2007. IDOCs also
need to avoid terms that either favor a particular vendor or favor a particular security technology or
mechanism over other, a competing techniques that already exist in the market or might be developed in
the future for the RFC 4949 but it’s simple is that it is an internet security glossary.
The glossary is rich in the history of early network security work, but it may be somewhat incomplete in
describing recent security work, which has been developing rapidly.
RFC 4949 is an Informational RFC describing Internet Security Glossary·