0% found this document useful (0 votes)
22 views2 pages

Tamis

The document discusses hardware vulnerabilities, defining them as weaknesses in physical components of computing devices, with examples like backdoors and the Rowhammer exploit. It emphasizes the importance of physical security measures to protect sensitive data, including ID badges, restricted access to server rooms, and CCTV monitoring. The document outlines specific policies for employees to minimize risks associated with unauthorized access to hardware.

Uploaded by

tamiskenneth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views2 pages

Tamis

The document discusses hardware vulnerabilities, defining them as weaknesses in physical components of computing devices, with examples like backdoors and the Rowhammer exploit. It emphasizes the importance of physical security measures to protect sensitive data, including ID badges, restricted access to server rooms, and CCTV monitoring. The document outlines specific policies for employees to minimize risks associated with unauthorized access to hardware.

Uploaded by

tamiskenneth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Tamis, Ray Kenneth J.

Part 1

1. Define a hardware vulnerability in your own words and provide an example.


- Is a weaknesses in the physical components of computing devices.
Hardware vulnerability flaws of physical part of machine such as
Processor, memory, and firmware.
Example, backdoors, meltdown spectre, and counterfeit hardware.
2. Why is physical access to computer hardware considered a security
risk? Suggest two ways to prevent unauthorized access.
- Because hardware systems can provide stronger security than software and
can also include an additional layer of security for mission-critical systems.
- Two ways to prevent unauthorized access ¹Implementing strong password
policies with multi-factor authentication (MFA) and ²regularly updating
software and patching vulnerabilities to address known security weaknesses.
3. Explain how the Rowhammer exploit works. Why is it difficult to prevent?
- Rowhammer is a vulnerability in commodity dynamic random access
memory (DRAM) chips that allows an attacker to exploit devices with DRAM
memory by repeatedly accessing (hammering) a row of memory until it
causes bit flips and transistors in adjacent rows of memory reverse their
binary state: ones turn into zeros and vice versa.
4. How do hardware vulnerabilities differ from software vulnerabilities?
Provide an example for each.
- hardware vulnerabilities are physical issues with the device itself, while
software vulnerabilities are issues within the code that operates on the
hardware. Example of a hardware vulnerability: A design flaw in a
CPU that allows attackers to exploit a specific instruction set to
gain unauthorized access to sensitive data. Example of a
software vulnerability: A web application that allows users to input
malicious code through a form field, enabling attackers to inject
harmful scripts and steal data (like SQL injection).
5. Why are hardware vulnerabilities more likely to be exploited in targeted
Attacks rather than in random hacking attempts?
- Because they often require a deep understanding of the specific hardware
architecture and are not easily discovered by generic scanning tools,
meaning a casual hacker is unlikely to identify them, while a
dedicated attacker with specific knowledge about the target
system can leverage these vulnerabilities effectively.

Part 2

physical Security Measures Policy for Hardware Protection

Protecting sensitive financial data requires strong physical security measures.


This policy outlines crucial steps employees must take to minimize hardware
vulnerabilities originate from physical access. First, all employees must wear
and visibly display company-issued ID badges at all times while on company
property. This helps identify authorized personnel and unnerve unauthorized
access. Second, access to server rooms and data centers is strictly restricted.
Only authorized personnel with specific business needs are permitted entry,
and all visits must be registered. Third, visitors must be ushered just by an
authorized employee at all times. Employees are responsible for the conduct
of their visitors. Fourth, sensitive areas are monitored by closed-circuit
television (CCTV) surveillance, and recordings are regularly reviewed. Fifth,
employees should immediately report any doubtful activity, including
unauthorized individuals or unsecured areas, to security personnel. Sixth,
physical security extends to employee workplace. Locking laptops with cable
locks when abandoned, even briefly, is mandatory. Finally, tear up sensitive
documents before disposal is critical. Adherence to these physical security
measures is paramount for safeguarding our sensitive financial data.

You might also like