WHAT IS A ZERO DAY?
Human often likes to update their life on the daily basis. Am I right??..If
you are a human then most probably your answer will be yes. This updating also includes updating your
cyber needs and uses. likely to update the phone software, security patches,
apps, cost-free software, paid software, or anything that satisfies your cyber
needs. These services are provided by various organizations. They make updates
to cater to many different users. From the day of update release, Both the
cyber attackers and the service providers turn their vision in finding any loopholes or any flaws in the
updated software versions. if there are
any loopholes, then there are more chances that they can be found by cyber
attackers or hackers. This allows the hackers to make a great move. Mostly
these attacks are referred to as Zero-Day attacks.
Zero-day is a flaw in the software, hardware, or firmware that is unknown to the party responsible for
patching or otherwise fixing the flaw. The term zero-day may refer to the vulnerability
itself, or an attack that has zero days between the time the vulnerability is
discovered and the first attack. Once a zero-day vulnerability has been made
public, it is known as an n-day or one-day vulnerability.
Since zero-day vulnerabilities
aren't known in advance, there is no way to guard against such exploits before
they happen. Ordinarily, when a researcher detects that a software program
contains a potential security issue, he or she will notify the software vendor
so they can fix the code and distribute a patch or software update. The hope
with a zero-day vulnerability is that even if an attacker hears about the
vulnerability, it will take time to figure out how to exploit it without being
detected -- and meanwhile, the fix will have been made available.
Anti-malware software,
intrusion detection systems (IDSes), and intrusion prevention systems (IPSec)
are often ineffective against zero-day attacks because the attacks do not yet
have a known signature. One of the best ways to detect a zero-day attack is
simply to monitor network logs. Activities falling outside of the normal scope
of operations could be an indicator of a zero-day attack.
Suggestions for
mitigating the effects of a zero-day attack include:
·
Keep all systems patched and
up to date.
·
Perform regular
vulnerability scanning.
·
Apply encryption and
authentication controls to network traffic.
·
Isolate sensitive traffic
flowing between servers.
·
Use network access control
to prevent rogue machines from gaining access.
·
Lockdown wireless access
points.
·
Stay on top of security
news.
Once a zero-day is found
in the wild, a patch can be developed and deployed to resolve the exploit. This
would make the exploit or attack no longer a zero-day.