NATS 1505 Lecture Notes - Lecture 8: Access Control, Race Condition, Malware

21 views2 pages

Document Summary

Google security research can be found here. Hardware vulnerabilities: hardware vulnerabilities are often introduced by hardware design flaws, ram memory for example, is essentially capacitors installed very close to one another. Categorizing security vulnerabilities: most software security vulnerabilities fall into one of the following categories: Systems and sensitive data can be protected through techniques such as authentication, authorization, and encryption: developers should not attempt to create their own security algorithms because it will likely introduce vulnerabilities. It is strongly advised that developers use security libraries that have already created, tested, and verified. Short for malicious software, malware is any code that can be used to steal data, bypass access controls, or cause harm to, or compromise a system: below are a few common types of malware: Spyware: this malware is design to track and spy on the user. Spyware often includes activity trackers, keystroke collection, and data capture. In an attempt to overcome security measures, spyware often modifies security settings.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents