Chapter 4 - System Architecture Flashcards

0
Q

IEEE/ISO 42010:2007

A

Systems and software engineering architecture description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Computer security

A

Defined as AIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an architects job?

A

To successfully create views for each stakeholder into a single global plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Register

A

A temporary storage location for the next CPU task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Arithmetic logic unit ALU

A

Actual execution of instructions occurs here, this is the brain of the processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Control unit

A

The traffic cop of the CPU .. It serializes the requests from the registers to the ALU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

General vs special registers

A

General registers hold variables and temporary data

Special registers hold more static data like program counters and pointers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the name for the bit that defines user mode vs privileged?

A

Program status word - PSW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is another name for user mode and privileged mode respectively?

A

Problem state and kernel/supervisor mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between address bus and data bus?

A

Address bus tells the location what it’s looking for data bus is what allows the data to move between location and CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LIFO

A

Last in first out

The order things are processed on the memory stack (think mtg)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Return pointer

A

Usually the first message in telling where to send the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stack pointer

A

This is the current stack location while processing a stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Program counter

A

Holds the memory address for the CPU actions needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cooperative multitasking vs preemptive multitasking

A

Cooperative means the resource programmatically releases the resources and preemptive means that the is controls all processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ready, blocked and running state?

A

Ready - waiting process
Running - executing process
Block - suspended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Process table

A

Think task manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Maskable vs non-maskable interrupt

A

Maskable means that the CPU can ignore it and no maskable means the CPU must immediately execute it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Watchdog timer

A

System will reboot if critical systems fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Threads

A

Individual instruction set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Software deadlock

A

When a resource is being used by another process and cannot continue, but the other process will not release until the first finishes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Process isolation

A

Ensuring that processes cannot use memory space of another process, this is required for preemptive multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Process Encapsulation

A

When process A can only speak to an interface from process B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data hiding

A

When one process does not know how another works, it simple sends to the interface between

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Time multiplexing

A

Time slices for resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Process naming distinction

A

PID is used to assist process isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Virtual memory addressing

A

Rather than address to memory applications address to the memory space allocated by the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Abstraction

A

The details of something are hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Memory manager functions?

A

Relocation - swap file, pointers
Protection - limit process access and access control
Sharing - complex controls govern memory space sharing
Local org - allow sharing of procedures like DLL
Physical org - virtual memory management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a base and limit register?

A

Base register is the beginning address of a memory segment and limit register is the last address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

DRAM

A

Capacitive memory that requires a refresh to ensure the capacitors do not lose charge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

SRAM

A

Static memory uses exclusively transistors and does not require refresh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Thrashing

A

Moving data around to free resources for more data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the difference between EEPROM and flash

A

EEPROM need firmware updates that write bit by bit over the previous

Flash can be rewritten at the block or device level and acts like a hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Absolute addresses vs logical

A

Physical vs virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Buffer overflow

A

When the buffer is too large and malicious code can be inserted

If accepted input is larger than input there is a possibility of inserting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

ASLR - Address space layout randomization

A

When an OS randomized and shifts address spaces around in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

DEP - data execution prevention

A

Locked down memory spaces for certain executables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Memory leaks

A

Not using proper code that will release memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Programmed IO

A

The application requests that the IO take place, this is CPU wasteful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Interrupt IO

A

Byte is sent, CPU moves on, interrupt occurs, byte is sent

This is better but still uses the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

IO over DMA

A

Also called unmapped IO

Does not use the processor, it’s just sent from memory to the DMA controller to the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Premapped IO

A

OS assigns memory address and trusts device not to be malicious

Scary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Fully mapped IO

A

OS brokers the IO requests of untrusted device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is ring architecture?

A

CPU levels. Ring 0 is unprotected ring 3 would be more protected. The CPU manufacturer decides the number of rings, OS decides how to use them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What does the word domain mean?

A

A collection of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Monolithic architecture

A

MSDOS - user mode / priveledged mode

Too much code could run in a higher mode

47
Q

What is THE?

A

A layered kernel approach where each later called the next user>IO>interpreter>mem>processor

48
Q

What is data hiding?

A

When you cannot bypass layers to call sub layers

49
Q

Micro kernel model

A

It is a smaller kernel subset to promote security, this became slow because of process level changes

50
Q

Hybrid micro kernel architecture

A

Partially uses the micro kernel for memory specific tasks, mostly uses the driver kernel to handle devices

51
Q

Security policy

A

Is a strategic tool to indicate how sensitive information is managed

52
Q

TCB

A

Trusted Computer Base - A collection of all the hardware, software, and firmware security components of a system

53
Q

Trusted path

A

The path between the user and the TCB

54
Q

Trusted shell

A

A shell someone cannot get into or out of

55
Q

Security perimeter

A

Divides the trusted from the untrusted

56
Q

Reference monitor

A

Used as a reference to user access of an object, this is effectively the law of the TCB

57
Q

Security kernel

A

All access decisions must go through the security kernel, it is the core of the TCB

58
Q

Multilevel security policy

A

Each level has it’s own security policy of where it can talk to

59
Q

State change model

A

System model over the premise all states of an object are regulated

60
Q

State transitions

A

When the state of an object changes

61
Q

Simple security rule

A

Subject cannot read at a higher priveledge.

62
Q
  • property
A

Cannot write to a level lower

63
Q

Strong star property

A

Read and write can only function at the level currently on

64
Q

Basic security theorem

A

If a system starts secure, and all state levels are secure, the system is secure regardless of input

65
Q

Tranquility principle

A

Subjects and objects cannot change states undefined in the security principle

66
Q

Bell-Lapadula

A

A security model used in MAC access control systems that specifies rules on read and write

67
Q

Biba model

A

Similar to Bell-Lapadula but concerned solely on data integrity

68
Q

*-integrity axiom

A

No write up, so dirty data does not mix with clean data

69
Q

Simple integrity axiom

A

No read down

70
Q

Invocation property

A

A dirty subject cannot use a clean tool to contaminate a clean object

71
Q

Clark-Wilson

A

An integrity model that compartmentalizations data based on programmatic processing

72
Q

Transformation procedures TP

A

Programmatic operations like read and write

73
Q

Constrained data items CDI

A

This data is allowed to be manipulated by TPs

74
Q

Unconstrained data items UDI

A

Users can directly manipulate these items

75
Q

Integrity verification procedures IVP

A

Checks consistency of CDI against reality

76
Q

Access triple

A

Subject, object, program

User, CDI, TP

77
Q

Well formed transaction

A

Using a TP to process a CDI and having it go through an IVP

78
Q

Covert channel

A

A way for an entity to receive information in an unauthorized secretive way

79
Q

Non-inference

A

Someone of a lower clearance cannot see state changes of a higher clearance

80
Q

Inference attack

A

When someone had access to something that goes through a state change that implies what the change means

81
Q

Lattice model

A

Access is defined as:

Least upper bound
Greatest lower bound

82
Q

Brewer-Nash model (Chinese wall model)

A

This model is used to prevent conflict of interest

If you access bank A files you cannot access bank B files

83
Q

Graham-Denning model

A

8 critical security questions to ask especially when programming

84
Q

Harrison-Ruzzo-Ullman model

A

Ensures access controls are being met at all levels

85
Q

Dedicated security mode

A

An OS model that means all users have a need to know all information and have signed NDA pertaining the information

86
Q

System high security mode

A

When a user has the security clearance to see it, but the need to know for only partial portions of the data

87
Q

Compartmented security mode

A

Just like high security mode, but the highest clearance data enforces who can access the system

88
Q

Compartment mode workstations

A

Have built in functionality to all multiple clearance levels on the same system

89
Q

Guards

A

A system used between trust (assurance) levels

90
Q

Assurance rating

A

An EOL # used to quantify a systems trust

91
Q

Common criteria

A

A systematic review used to rate a system A-D

92
Q

Division D

A

This division is the lowest security rating

93
Q

Division C1

A

Discretionary security protection - access is controlled by user or group low security environment

94
Q

Division C2

A

Controlled access protection - each individual is authenticated and security events are audited. All mediums containing data cannot store data, ie memory or temp storage

95
Q

Division B1

A

Label security - each object must contain an accurate security label

96
Q

Division B2

A

Structured protection - fully documented and defined security policy with stringent authentication and covert channel analysis has been passed

97
Q

Division B3

A

Security domains - reduction of complexity from B2 .. Reduced code and simplified procedures

98
Q

Division A

A

Strictly verified and scrutinized B3

99
Q

Rainbow books

A

Like the orange book/common criteria, but targeted to the business sector

100
Q

Red book

A

Trusted network interpretation -

Communication integrity
Denial of service prevention
Compromise protection

(Read more on red book/rainbow books)

101
Q

Assurance

A

Derived from comparing how things actually work to the theory of how they should work

102
Q

What is he history of the TCSEC

A

TCSEC became Common Criteria

103
Q

ITSEC

A

European version of the common criteria

104
Q

What is different between TCSEC and ITSEC?

A

ITSEC has a separate rating for assurance vs functionality

105
Q

EAL

A

Evaluation assurance level

EAL 1 - functionally tested
2 - structurally tested
3 - methodically tested and checked
4 - methodically designed tested and reviewed
5 - semi formally designed and tested
6 - semi formally verified design and tested
7 - verified design

106
Q

Verified design?

A

Mathematically proven model

107
Q

How rare protection profiles used in common criteria?

A

A committed assurance level to develop on and towards

108
Q

What 5 parts make up and protection profile?

A
Descriptive elements
Rationale
Functional requirements
Development assurance requirements
Evaluation assurance requirements
109
Q

What steps are taken during the CC (common criteria)?

A

Protection profile is made - assurance target
Target of evaluation - security target
Security target - how our product does the above
Security functional req. - individual security function proof
Security assurance req. - measures taken during development to assure these requirements are met and confirmable
Packages - what must be met to continue with an EAL rating

110
Q

ISO 15408

A

International standard linked to common criteria

  • 1 - lays out the general concept of the common criteria
  • 2 - describes and catalogs security functionality
  • 3 - defined assurance requirements with criteria
111
Q

Certification vs accreditation

A

Certification - the testing of a claim

Accreditation - acceptance of the risk associated with the certification process results

112
Q

Open vs closed systems

A

Open standardized interoperability vs exclusively proprietary interoperability

113
Q

Maintenance hook

A

This is code developed to monitor the software for flaws, these are dangerous security wise..

Think of my /end function!

114
Q

Time of use attack

A

Similar to race condition, but manipulates something process 2 relies on prior to process 2 running, (a flag in a file)

115
Q

If time of use is mandatory in code how can you avoid this?

A

Using system locks on the resources required by the process