The document discusses hardware vulnerabilities, defining them as weaknesses in physical components of computing devices, with examples like backdoors and the Rowhammer exploit. It emphasizes the importance of physical security measures to protect sensitive data, including ID badges, restricted access to server rooms, and CCTV monitoring. The document outlines specific policies for employees to minimize risks associated with unauthorized access to hardware.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
22 views2 pages
Tamis
The document discusses hardware vulnerabilities, defining them as weaknesses in physical components of computing devices, with examples like backdoors and the Rowhammer exploit. It emphasizes the importance of physical security measures to protect sensitive data, including ID badges, restricted access to server rooms, and CCTV monitoring. The document outlines specific policies for employees to minimize risks associated with unauthorized access to hardware.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
Tamis, Ray Kenneth J.
Part 1
1. Define a hardware vulnerability in your own words and provide an example.
- Is a weaknesses in the physical components of computing devices. Hardware vulnerability flaws of physical part of machine such as Processor, memory, and firmware. Example, backdoors, meltdown spectre, and counterfeit hardware. 2. Why is physical access to computer hardware considered a security risk? Suggest two ways to prevent unauthorized access. - Because hardware systems can provide stronger security than software and can also include an additional layer of security for mission-critical systems. - Two ways to prevent unauthorized access ¹Implementing strong password policies with multi-factor authentication (MFA) and ²regularly updating software and patching vulnerabilities to address known security weaknesses. 3. Explain how the Rowhammer exploit works. Why is it difficult to prevent? - Rowhammer is a vulnerability in commodity dynamic random access memory (DRAM) chips that allows an attacker to exploit devices with DRAM memory by repeatedly accessing (hammering) a row of memory until it causes bit flips and transistors in adjacent rows of memory reverse their binary state: ones turn into zeros and vice versa. 4. How do hardware vulnerabilities differ from software vulnerabilities? Provide an example for each. - hardware vulnerabilities are physical issues with the device itself, while software vulnerabilities are issues within the code that operates on the hardware. Example of a hardware vulnerability: A design flaw in a CPU that allows attackers to exploit a specific instruction set to gain unauthorized access to sensitive data. Example of a software vulnerability: A web application that allows users to input malicious code through a form field, enabling attackers to inject harmful scripts and steal data (like SQL injection). 5. Why are hardware vulnerabilities more likely to be exploited in targeted Attacks rather than in random hacking attempts? - Because they often require a deep understanding of the specific hardware architecture and are not easily discovered by generic scanning tools, meaning a casual hacker is unlikely to identify them, while a dedicated attacker with specific knowledge about the target system can leverage these vulnerabilities effectively.
Part 2
physical Security Measures Policy for Hardware Protection
Protecting sensitive financial data requires strong physical security measures.
This policy outlines crucial steps employees must take to minimize hardware vulnerabilities originate from physical access. First, all employees must wear and visibly display company-issued ID badges at all times while on company property. This helps identify authorized personnel and unnerve unauthorized access. Second, access to server rooms and data centers is strictly restricted. Only authorized personnel with specific business needs are permitted entry, and all visits must be registered. Third, visitors must be ushered just by an authorized employee at all times. Employees are responsible for the conduct of their visitors. Fourth, sensitive areas are monitored by closed-circuit television (CCTV) surveillance, and recordings are regularly reviewed. Fifth, employees should immediately report any doubtful activity, including unauthorized individuals or unsecured areas, to security personnel. Sixth, physical security extends to employee workplace. Locking laptops with cable locks when abandoned, even briefly, is mandatory. Finally, tear up sensitive documents before disposal is critical. Adherence to these physical security measures is paramount for safeguarding our sensitive financial data.