Lesson 12 + 13 Flashcards

1
Q

hardware Root of Trust (RoT) or trust anchor

A

hardware Root of Trust (RoT) or trust anchor is a secure subsystem that is able to provide attestation.

The RoT is usually established by a type of cryptoprocessor called a trusted platform module (TPM)

Attestation means that a statement made by the system can be trusted by the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attestation

A

Attestation means that a statement made by the system can be trusted by the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TPM

A

TPM is a specification for hardware-based storage of encryption keys, hashed passwords, and other user and platform identification information.

The TPM is implemented either as part of the chipset or as an embedded function of the CPU.

Each TPM is hard-coded with a unique, unchangeable asymmetric private key called the endorsement key.

TPM also supports the concept of an owner, usually identified by a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure boot

A

Secure boot is designed to prevent a computer from being hijacked by a malicious OS.

Secure boot requires UEFI, but does not require a TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

unified extensible firmware interface (UEFI)

A

UEFI provides code that allows the host to boot to an OS. UEFI can enforce a number of boot integrity checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A trusted or measured boot

A

A trusted or measured boot process uses platform configuration registers (PCRs) in the TPM at each stage in the boot process to check whether hashes of key system state data (boot firmware, boot loader, OS kernel, and critical drivers) have changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Boot attestation

A

Boot attestation is the capability to transmit a boot log report signed by the TPM via a trusted process to a remote server, such as a network access control server.

The boot log can be analyzed for signs of compromise, such as the presence of unsigned drivers.

The host can be prevented from accessing the network if it does not meet the required health policy or if no attestation report is received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Memorandum of understanding (MOU)

A

agreement to express an intent to work together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Business partnership agreement (BPA)

A

BPA - the partner agreements that large IT companies (such as Microsoft and Cisco) set up with resellers and solution providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-disclosure agreement (NDA)

A

Legal basis for protecting information assets. NDAs are used between companies and employees, between companies and contractors, and between two companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Service level agreement (SLA)

A

A contractual agreement sets out the detailed terms under which a service is provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Measurement systems analysis (MSA)

A

quality management processes, such as Six Sigma, make use of quantified analysis methods to determine the effectiveness of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hardening

A

The process of putting an operating system or application in a secure configuration is called hardening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Host-based intrusion detection systems (HIDS)

A

provide threat detection via log and file system monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An endpoint protection platform (EPP)

A

An endpoint protection platform (EPP) is a single agent performing multiple security tasks, including malware/intrusion detection and prevention, but also other security features, such as a host firewall, web content filtering/secure search and browsing, and file/message encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

data loss prevention (DLP) agent

A

data loss prevention (DLP) agent. This is configured with policies to identify privileged files and strings that should be kept private or confidential, such as credit card numbers. The agent enforces the policy to prevent data from being copied or attached to a message without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

endpoint detection and response (EDR)

A

endpoint detection and response (EDR) - provide real-time and historical visibility into the compromise, contain the malware within a single host, and facilitate remediation of the host to its original state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

embedded system

A

embedded system is a complete computer system that is designed to perform a specific, dedicated function.

Embedded systems can be characterized as static environments. A PC is a dynamic environment.

Embedded systems are normally based on firmware running on a programmable logic controller (PLC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

System on chip (SoC)

A

System on chip (SoC) is a design where all these processors, controllers, and devices are provided on a single processor die (or chip).

Arduino, Rasperberry PIs are examples of SoC boards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

field programmable gate array (FPGA)

A

field programmable gate array (FPGA) is a type of controller that the end customer can configure the programming logic of the device to run a specific application.

21
Q

application-specific integrated circuits (ASICs)

A

application-specific integrated circuits (ASICs) used in Ethernet switches. ASICs are expensive to design, however, and work only for a single application, such as Ethernet switching.

22
Q

Operational Technology (OT) network.

A

A cabled network for industrial applications is referred to as an operational technology Operational Technology (OT) network.

23
Q

subscriber identity module (SIM)

A

subscriber identity module (SIM) The SIM is issued by a cellular provider, with roaming to allow use of other suppliers’ tower relays.

24
Q

Backhaul security

A

Backhaul security is usually enforced using IPSec.

25
Q

Industrial control systems (ICSs)

A

Industrial control systems (ICSs) provide mechanisms for workflow and process automation. These systems control machinery used in critical infrastructure, like power suppliers, water suppliers, health services, telecommunications, and national security services.

26
Q

supervisory control and data acquisition (SCADA)

A

supervisory control and data acquisition (SCADA) system takes the place of a control server in large-scale, multiple-site ICSs.

It typically uses WAN communications, such as cellular or satellite, to link the SCADA server to field devices.

27
Q

smart meter

A

A smart meter provides continually updating reports of electricity, gas, or water usage to the supplier, reducing the need for manual inspections.

Most meters use cellular data for communication back to the supplier, and an IoT protocol, such as ZigBee, for integration with smart appliances.

28
Q

UAV

A

unmanned aerial vehicles

29
Q

Way of increasing the security of data in transit for embedded systems

A

is through the use of wrappers, such as IPSec.

30
Q

Corporate owned, business only (COBO)

A

Corporate owned, business only (COBO)—the device is the property of the company and may only be used for company business.

31
Q

Corporate owned, personally-enabled (COPE)

A

Corporate owned, personally-enabled (COPE)—the device is chosen and supplied by the company and remains its property. The employee may use it to access personal email and social media accounts and for personal web browsing

32
Q

Choose your own device (CYOD)

A

Choose your own device (CYOD)—much the same as COPE but the employee is given a choice of device from a list

33
Q

Enterprise mobility management (EMM)

A

Enterprise mobility management (EMM) is a class of management software designed to apply security policies to the use of mobile devices and apps in the enterprise

34
Q

Mobile device management (MDM)

A

Mobile device management (MDM)—sets device policies for authentication, feature use (camera and microphone), and connectivity. MDM can also allow device resets and remote wipes.

35
Q

Mobile application management (MAM)

A

Mobile application management (MAM)—sets policies for apps that can process corporate data, and prevents data transfer to personal apps.

This type of solution configures an enterprise-managed container or workspace.

36
Q

UEM (unified endpoint management)

A

UEM (unified endpoint management) - Enterprise software for controlling device settings, apps, and corporate data storage on all types of fixed, mobile, and IoT computing devices.

37
Q

Context aware authentication

A

Context aware authentication – Phones can have a feature to disable screen lock if it detects that it is in a trusted location.

38
Q

Indoor Positioning System (IPS)

A

Indoor Positioning System (IPS)—works out a device’s location by triangulating its proximity to other radio sources, such as cell towers, Wi-Fi access points, and Bluetooth/RFID beacons.

39
Q

Geofencing

A

Geofencing is the practice of creating a virtual boundary based on real-world geography. Geofencing can be a useful tool with respect to controlling the use of camera or video functions or applying context-aware authentication

40
Q

Sideloading

A

Sideloading – Unknown sources enable, untrusted apps can be downloaded from a website and installed using the .apk file format on Android devices.

41
Q

Containerization

A

Containerization - allows the employer to manage and maintain the portion of the device that interfaces with the corporate network.

42
Q

Carrier unlocking

A

Carrier unlocking—for either iOS or Android, this means removing the restrictions that lock a device to a single carrier.

43
Q

an ad hoc network

A

an ad hoc network - Wireless stations can establish peer-to-peer connections with one another, rather than using an access point.

44
Q

bluejacking

A

bluejacking, a sort of spam where someone sends you an unsolicited text (or picture/ video) message or vCard (contact details)

45
Q

Bluesnarfing

A

Bluesnarfing refers to using an exploit in Bluetooth to steal information from someone else’s phone.

46
Q

Radio Frequency ID (RFID)

A

Radio Frequency ID (RFID) is a means of encoding information into passive tags, which can be easily attached to devices, structures, clothing, or almost anything else

47
Q

Rich Communication Services (RCS)

A

Rich Communication Services (RCS) is designed as a platform-independent advanced messaging app, with a similar feature set to proprietary apps like WhatsApp and iMesssage.

These features include support for video calling, larger binary attachments, group messaging/calling, and read receipts.

48
Q

real-time operating system (RTOS)

A

real-time operating system (RTOS). An RTOS is often used for time-sensitive embedded controllers, of the sort required for the modulation and frequency shifts that underpin radio-based connectivity.