ZERO-DAY A FUTURE THREAT, AND HOW TO
PROTECT YOUR DATA.
ABSTRACT
It is known that practically all software has
security flaws (programming problems that give individuals opportunities to explore
previously nonexistent), many of these vulnerabilities not yet discovered, and
hundreds are corrected every month through the packages available organizations
affected, sometimes new versions and updates.
The term " zero day " (zero hour or
0day ) refers to the unknown nature of security breaches for companies , this attack
tries to exploit computer application vulnerabilities that are unknown yet even
by software manufacturers . Explaining in a simple and generally, there are two
types of "exploit", or flaws / vulnerabilities that can be used in
attacks. Those found by security companies and found by hackers whose purpose
is exploration.
The issue is that some hackers choose to
disclose newly discovered failures to apply the necessary corrections are
sometimes rewarded for it with prizes. The “black hats” usually prefer to save
for their own benefit a future attack or to share with attackers before the
developer of software knows about the vulnerability.
HISTORY ALGORITHM AES