Security Threats Of Computer Architecture

Decent Essays
Computer architecture is a victim to its own capacity, lending itself to a desire for a better, faster, and more optimized architecture. However, with this desire for a better architecture, there are threats inherent in the evolution. These threats steam from bugs in the architecture whether it due to oversight or malicious intent, compounding when external threats are exploiting architecture’s weaknesses. Computers have always been susceptible to security threats in history as well as present day. Security threats has caused computer architecture to change to insure the protection of instructions in memory, the restrictions on instruction execution, and memory management. Therefore, remedying for current and anticipating other security threats, evolution to computer architectures is a necessity.

With the threat of
…show more content…
In the early days of automated computing it was in the form of mechanical, which eventually evolved to digital, which continues to evolve every day. Evolution based on the desire to make the current computer architecture smaller, faster, and better there is also another factor that plays a major role in the evolution that is security threats. Security threats come in different forms, such as a bug in memory instructions due to oversight or even malicious intent. Regardless of the vulnerability, there are areas that need constant improvement to help mitigate security threats. There areas that are pivotal factors; are protecting memory instructions by limiting either if memory is read-only or if it is also writable. Limiting and restricting the instructions being executed is another factor in mitigating security threats. Lastly, proper memory management for addressing proper defense in security threats to computer architecture. Advancements in current technology has to look at many facets of improvement in order to successfully

Related Documents

  • Improved Essays

    Nt1310 Unit 7

    • 507 Words
    • 3 Pages

    Famanga Ngobeh Prof. Saunders Review Question Lab September 23, 2015 1. Move copies data from one memory location or register to another. The term “move” is a misnomer because data values in the source location aren’t removed. They’re tested, and copies of these values are placed in the destination location. Therefore, a move operator is really a copy operator.…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1

    • 360 Words
    • 2 Pages

    These days’ security is a critical factor of I.T whether it be protecting physical devices or information. What are some basic examples of ways to provide physical security for a server? What can be done about logical security? Security in the critical factor for everything related to internet.…

    • 360 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    These studies might show labor hours needed, hardware and software costs, utility costs and prevention of data lost. Another aspect of computer security is disaster recovery, this might include damage caused by a natural or manmade occurrence. Computer equipment that is damaged might include sensitive information stored on hard drives and these would either need to be recovered or disposed of. The key decision makers in a security project would include: Chief Executive Officer: The most senior corporate officer reports to the board of directors.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Course Project

    • 296 Words
    • 2 Pages

    2.1 Goals The goals of this internship are: a. Provide a solution which reduces the stall time and increases the system efficiency. b. A solution which could be generalized in future to be used with more than two sub-systems. 2.2 Solution Overview The most common solution to such a problem is by making use of a buffer.…

    • 296 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Fig 1.2 Classes of interrupts Program Generated by some condition that occurs as a results of an instruction execution, such as arithmetic overflow, division by zero, attempt to execute am illegal machine instruction, and reference outside a user's allowed memory space. Timer Generated by a timer within the processor. This allows the operating system to perform certain functions on a regular basis. I/…

    • 364 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Target received red flags right before the actual attack. Due to common cyber crimes target was already aware of the threats that happen so they installed $1.6 million malware detection tool Fireeye. They also had a team of security specialists in Bangalore and Minneapolis who monitor its computers around the clock. Fire eye did its job and notified them on multiple occasions about the incident that’s going to happen; unfortunately security team appears to have made wrong call. "…

    • 332 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Royal Security Review Template Welcome to our Royal Security Review! The team at Royal Security has over one hundred years of combined experience in home security. Additionally, they provide you with $2,500 in equipment that you can use to customize a system that best suits your needs. Or, you can opt to have them build a plan for you. Royal Security offers home security and home automation options as well.…

    • 1519 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The authors of the book suggest physical means of making sure that your personal information does not get into the wrong hands. So what will it be: hammer or axe? ` In conclusion, the third chapter of Blown to Bits was very informative. “Ghosts in the Machine” was a chapter about how information can be hidden within computers. It is important to be careful when sending sensitive information.…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Introduction Over the last few decades, American Society has rapidly changed due to the prompt development of advanced computer technology. These advancements continue to energize the next generation to push the boundaries of the possible, by challenging the impossible. Throughout the previous decades these boundaries have continued to be extended and defeated, impelling professionals to reanalyze what is truly impossible. However, due to the incredible pace in which these advancements are being achieved, international communities, like America, are left defending against threats and vulnerabilities that are unknown.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Who Owns the Future The Analytical Engine has been around since 1837, which the first mechanical computer. 127 Years later, the first Supercomputer was released, the CDC 6000. The CDC 6000 only had a few processors, then in the 1990’s it had a thousand processors, now in the twenty-first century a supercomputer has over 60,000 processors.…

    • 695 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    They can store more memory, have the ability to do more tasks, all taking less time than the previous version. Technology has been ingrained in American culture. The growth of technology has been rising exponentially. Revolutions in technology has proven itself to be valuable to society, so scientists and inventors have spent a lot of time, money and energy on artificial intelligence. Creating advanced artificial…

    • 1306 Words
    • 6 Pages
    Superior Essays