N. Z. Jhanjhi
Hardware vulnerabilities: Taxonomy and business security models
Jhanjhi, N. Z.; Shah, Imdad Ali; Brohi, Sarfraz Nawaz
Authors
Imdad Ali Shah
Sarfraz Nawaz Brohi
Abstract
The primary objective of this chapter is to address the hardware vulnerabilities risks and challenges. A hardware vulnerability is a flaw in a computer system that can be remotely exploited by threat actors. They can then infiltrate a network by introducing malicious code. Vulnerability management, also known as vulnerability mapping, is the continuous process of identifying, categorizing, prioritizing, fixing, and reducing vulnerabilities in an environment. It involves assigning software high priority and promptly addressing risks to stop data breaches and cyberattacks. Considering the nature of the hardware, hardware security is different from software, network, and data security, whether it is being used for attack or defense. We must take hardware security into account early in product life cycles since hardware design and manufacturing frequently take place prior to or during software development. Information systems are becoming more common in a world moving toward total digitization. These systems are complex systems with hardware at their core. The investigation of potential hardware vulnerabilities must be included when addressing the security of these systems to prevent potential intrusions and malicious uses, as their exploitation can render any online or software-based defences worthless. we define hardware security and offer a meaningful and thorough taxonomy for hardware vulnerabilities and the attacks that take advantage of them to compromise the system. Consequently, the researcher's focus on this topic has increased recently.
Publication Date | Sep 27, 2024 |
---|---|
Deposit Date | Dec 12, 2024 |
Publisher | IGI Global |
Peer Reviewed | Peer Reviewed |
Pages | 129-146 |
Book Title | Generative AI for Web Engineering Models |
ISBN | 9798369337035 |
DOI | https://doi.org/10.4018/979-8-3693-3703-5.ch006 |
Public URL | https://uwe-repository.worktribe.com/output/13364556 |
You might also like
A three-level ransomware detection and prevention mechanism
(2020)
Journal Article
A data tracking and monitoring mechanism
(2020)
Book Chapter
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search