Friday, 26 April 2019

CIS 542 WEEK 8 DISCUSSION Question

CIS 542 WEEK 8 DISCUSSION Question


"Meltdown and Spectre Vulnerabilities" 
One of the biggest concerns when a vulnerability is discovered is how to inform the public. Companies often subscribe to Security RSS feeds, so they are made aware of vulnerabilities quickly. One of the most critical vulnerabilities found today that affect both Websites and browsers is the Meltdown and Spectre vulnerability.
  • Research the Meltdown & Spectre vulnerability. Summarize your findings and describe the total global impact of this vulnerability. Search the Internet and locate Linus Torvalds’s comments on Meltdown and Spectre vulnerability. After you've reviewed Torvald’s comments, do you agree or disagree? Justify your rationale with other research on the topic. Are there tools available to verify if a computer is susceptible to this vulnerability? Share any additional useful links or tools you find with your classmates. Note:Please cite your sources for the research you reviewed by posting a link to the site in the discussion thread. 
  • After reading a few of your classmate’s postings, reply to the ones where you learned something new, or have something to add. Get in early to post your initial response and keep the discussion going. 














"Meltdown and Spectre Vulnerabilities" 
One of the biggest concerns when a vulnerability is discovered is how to inform the public. Companies often subscribe to Security RSS feeds, so they are made aware of vulnerabilities quickly. One of the most critical vulnerabilities found today that affect both Websites and browsers is the Meltdown and Spectre vulnerability.
  • Research the Meltdown & Spectre vulnerability. Summarize your findings and describe the total global impact of this vulnerability. Search the Internet and locate Linus Torvalds’s comments on Meltdown and Spectre vulnerability. After you've reviewed Torvald’s comments, do you agree or disagree? Justify your rationale with other research on the topic. Are there tools available to verify if a computer is susceptible to this vulnerability? Share any additional useful links or tools you find with your classmates. Note:Please cite your sources for the research you reviewed by posting a link to the site in the discussion thread. 
  • After reading a few of your classmate’s postings, reply to the ones where you learned something new, or have something to add. Get in early to post your initial response and keep the discussion going. 
  •  

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...