How are you? Hope so everyone would be safe and sound just like me as I am also safe Alhamdulillah....
I am going to share my topic with all of you which is about zero day vulnerability so I would like you know about its basics and then I would make it more understandable for you with the help of an example.
When I talk about zero day vulnerabilities then it is a topic which is related to cyber security so let me break it down into simple words about its basics.
Zero day vulnerability is defined as securities weakness in software or system which is due to any unknown vision and it is also unknown to the developer or vendor. Hackers can exploit this vulnerability before giving chance to vendor to fix the problem. When I talk about word zero day in this terminology zero day vulnerability then it means that there is no day or there is zero day would be available to the vendor for protecting against the hacks and attacks.
Zero day vulnerability could be very dangerous because it is not known by public that's why there are no availability of any kind of fixes so it becomes advantages for manipulators or hackers and in this way they take benefit from the vulnerability to launch different kind of attacks and they become more alert for stealing and theft of data and in this way system also becomes compromised.
There could be different ways in which discovery of zero day vulnerability can happen. There are security researchers that in a very responsive way reveal and disclose this happening to the vendors so that they may fix the problem but it can also be discovered by the hackers who want to keep it secret and want to exploit it for their personal benefits.
After the discovery of zero day vulnerability most commonly it is sold in the black market among those people and users that have interest in using them for their personal benefits and for the malicious purpose and the people or users who buy them could be those who are involved in cyber crime or even they could be from the intelligence agencies.
When I talk about protection from the zero day vulnerability is very important for software vendors and developers that they should have security practice is in the place and these practices good include the conduction of regular security audits as well as implementation of coding practices and having an arrangement or process for addressing about these vulnerability in a quick way right after their Discovery.
Security researchers also have a very significant role in the identification and making reports in the zero day vulnerability so by playing their role in revealing these vulnerability to vendor in a secure and responsible wave they can be very helpful in giving surety that necessary fixes would be released soon for the protection of users.
In cyber security landscape zero day vulnerability is one of the most significant concerned nowadays. They introduce a kind of threat due to a reason which is unknown and could be exploited by hackers before the availability of any fix and solution. So in this way it is important to highlight the proactive security measures and collaboration and interaction between the vendors, developers and securities researchers for having a proper strategy in advance for protection against these kind of vulnerability.
Now I am going to share and imaginary example with all of you so that above concepts that are explain by me becomes more easier to understand for all of you!!
Suppose that there is a encryption algorithm that is used at wide scale because it is believed that it is one of the most secure encryption algorithm and algorithm is called Mathlock. There are different people and users who are using this algorithm for the protection of their sensitive data such as their important passwords and it could also be there any kind of information which they don't want to reveal openly and publicly. Now suppose that there is a hidden weakness and any kind of flaw that is unknown still and it is not discovered yet to the public or anyone else. Through weakness which is present in mathematical algorithm would be very easy to break now by any hacker and they can break encryption and can reach very easily to the sensitive information and data of other users.
Now you can imagine that a person who want to hack sensitive information or a hacker have advanced skills in mathematics and he with his advanced skills in math stumbles upon this flaw.
Now the hacker recognize that by the exploition of a particular mathematical property of Mathlock he would be able to decrypt any kind of data which he want to know and which is encrypted with this algorithm Mathlock. Now the hacker would make sure that this knowledge of weakness in software or algorithm should remain limited to him so that he may use it for gaining unauthorized access to the sensitive data for making his own personal benefits and profits.
It would remain as a zero day vulnerability since this weakness of software or Mathlockwould not be recognized and discovered by algorithm developers and public. Users of this mathematical algorithm would be unaware from their encrypted data that it is at risk unless or until zero day vulnerability is discovered and it is fixed.
In the world of software discovery of vulnerability comes with the different consequences that are important to understand because it focus that how much is important to have a proper testing ,peer review and continuous developments of the mathematical algorithms and methods of the encryption of data.
That was all about my explanation regarding the topic zero day vulnerability so I tried my best to explain first of all into my simpler words that this is related to cyber security and why it is important to discover it at earlier stage and then I tried my best to explain it in the form of an imaginary example so now hopefully it is understood topic for everyone and there is nothing difficult to understand it for any newbie also.
Now I want to say goodbye to you all and very soon I would be there with another informative topic for all of you 💖
X-promotion link 🔗🖇️
https://twitter.com/KKhursheedanwar/status/1752584698701001045?t=NIxYmtpf-XVcdsBI6ZDl1w&s=19
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Note:- ✅
Regards,
@jueco
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit