You are on page 1of 4

Running Head: CYBERSECURITY 1

Cache Handling in IT Security

Name

Course

Tutor

Date
CYBERSECURTY 2

Introduction

Cache in computer systems refers to a small amount o memory that temporarily holds

data and instructions that a CPU is likely to reuse. Primarily, a cache in the CPU saves data to

avoid the need for software to re-download or regenerate resources. During data transmission,

the back-end processor has access to the data fed into the cache and reads it. Consequently, it

receives a payload and queries for an object's presence as a follow-up (Ng, 2017). If the

query turns up in the affirmative, an order stems from deleting all reference to the object's

reputation. Throughout the process, the data in question has not been red by the cache,

meaning that the "if present, delete" command's implementation is automatic. Therefore, the

implication of the statement implies that securing a cache to minimize risk interference relies

on reputation processing to issue the delete command without having to communicate with

any other entity involved in the data transmission process.

Back-end Processing in Cache Security

As stated above, the processing sequence determines the creation or elimination of an

attack surface based on access and reading the status of the data. When the cache has not read

the data, there is a limited attack surface in case of a compromised packet since minimal

manipulation of the back-end process. Therefore, it is essential to launch investigations into

processing sequences and data retrieval modules to uncover attack surfaces. Additionally, the

exploration of data flows is an effective way of revealing attack surfaces. In a nutshell, back-

end processing in cache security advocates for the realization of limited data flows in the

absence of necessity to remove the attack surfaces that create security vulnerabilities. Back-

end processing may, however, be inadequate in limiting attacks. As such, specific front-end

processes may help ensure increased safeguards to the system during information

transmission (Ghasempouri, et al., 2020).


CYBERSECURTY 3

Front-end Processing in Cache Security

In the vent of data flow from the front end backward, reputations are requested to

enhance the system's defense by planning for cases' failure. Reputation requests are formed

by the front end software and are determinant of how the back-end processes treat the data

they come into contact with. In discharging its security responsibilities, the front end relies on

the back end to precise data after requesting the help of API. Therefore, the back-end has the

authority to reject a reputation request from the front end and such limits, a packets' ability to

clear as "safe" data. Since data used in the creation of reputations are commercially valuable,

reputation processing is wholesomely designed to reputation data (Dehling, et al., 2019).


CYBERSECURTY 4

References

Dehling, F., Mengel, T., & Iacono, L. L. (2019, November). Rotten Cellar: Security and

Privacy of the Browser Cache Revisited. In Nordic Conference on Secure IT

Systems (pp. 20-36). Springer, Cham.

Ghasempouri, T., Raik, J., Paul, K., Reinbrecht, C., Hamdioui, S., & Taouil, M. (2020,

April). A Security Verification Template to Assess Cache Architecture

Vulnerabilities. In 2020 23rd International Symposium on Design and Diagnostics of

Electronic Circuits & Systems (DDECS) (pp. 1-6). IEEE.

Ng, W. L. (2017). Design of security scheme to prevent DNS cache poisoning attacks.

You might also like