Chapter 1 Flashcards

1
Q

Operational security of software-intensive systems depends on the practices and techniques during their

A

design and development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lifecycle processes must consider the _______ inherent in the operational environments where systems are deployed

A

security- related

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Increased consideration of operational security earlier in the acquisition and development process provides an opportunity to _____________

A

tone decisions to address security risk and reduce the total cost of operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SCADA stands for

A

supervisory control and data acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Much of the information protection in place today is based on the principles established by _______

A

Saltzer and Schroeder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where and when did Saltzer and Schroeder’s publication appear?

A

1974, Communications of the ACM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was the title of Saltzer and Schroeder’s influential paper?

A

“The Protection of Information in Computer Systems”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What did Saltzer and Schroeder define as security?

A

“Techniques that control who may use or modify the computer or the information contained in it.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three main categories of security concern?

A

Confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name some examples of security problems

A

Malware, viruses, XSS, SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Those working with deployed systems refer to their enhanced security needs as _____

A

Cyber Security Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Software assurance as a term usually refers to the areas of ______

A

acquisition and development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the NASA definition of software assurance?

A

“The planned and systematic set of activities that ensure that software lifecycle processes and products conform to requirements, standards, and procedures.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What ISO standards are a good reference for software assurance topics?

A

ISO/IEC 2008a, 2008b, 2009, 2011, 2015

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do definitions of software assurance usually include?

A

The requirement that software functions as intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s one reason for the different approaches suggested by the existing definitions of software assurance?

A

Risks related to modern systems of systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some other challenges to effective operational security?

A

The increased use of commercial off-the-shelf (COTS) and open-source software as components within a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Sustainment is

A

maintaining a deployed system over time as technology and operational needs change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ignoring the issues surrounding sustainment can _______

A

undermine the stability, security and longevity of systems in production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Economy of mechanism

A

Keep the design as simple and small as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fail-safe defaults

A

base access decisions on permission rather than exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

complete mediation

A

every access to every object must be checked for authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

open design

A

the design should not be secret. the mechanisms should not depend on the ignorance of the potential attackers, rather on the possession of specific and more easily protected keys and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

separation of privilege

A

where feasible, a protection mechanism that requires 2 keys to unlock is more robust and flexible than one that allows access to the presenter of only a single key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
least privilege
every program and every user of the system should operate using the least set of privileges necessary to complete the job.
26
least common mechanism
minimize the amount of mechanism common to more than one user and depended on by all users
27
psychological acceptability
it is essential that the human interface be designed for ease of use so that users routinely and automatically apply the protection mechanisms correctly
28
a ______ of risk drives assurance decisions
perception
29
organizations without effective software assurance programs perceive risks based on ______
successful attacks and usually respond reactively
30
organizations can incorrectly perceive risk when they don't ________
understand the threats and their impacts
31
risk concerns shall be _______ across all stakeholders and all interconnected technology elements
aligned
32
highly connected systems require _________
the aligning of risk across all stakeholders
33
protections can be applied at every technology _____
level
34
protections will conflict if not _____________
well orchestrated
35
dependencies shall not be trusted until proven _______
trustworthy
36
assurance of an integrated product depends on _________
other people's assurance decisions
37
organizations must decide how much trust to place in dependencies based on _______
realistic assessments of the threats, impacts and opportunities represented by various interactions
38
dependencies are not _____
static
39
organizations must regularly review ______
trust relationships
40
attacks shall be _____
expected
41
a ________ of attackers can compromise an organization's technology assets
broad community
42
there are no ______ protections against attacks
perfect
43
the attacker profile is _______
constantly changing
44
assurance requires effective ______ among all technology participants
coordination
45
organizations must apply protection broadly across its ________
people, policies and technologies
46
attackers take advantage of ______
all possible entry points
47
clearly establish ______ and _____
authority and responsibilityA
48
assurance shall be _______ and ______
well planned and dynamic
49
assurance must represent a balance between _____, _____, and ______
governance, construction and operation
50
a means to measure and audit overall assurance shall be _______
built in
51
organizations cannot manage what they cannot ______
measure
52
users will not address issues unless ______
held accountable
53
organizations must take focused measures to ensure that components are
securely engineered
54
operational systems are built and acquired through coordinated actions involving predefined steps. This is known as a _____
lifecycle
55
what standards provide guidance for suitable lifecycles?
NIST SP-800-160, ISO 15288
56
Every component of the software system and its interfaces must be operated and sustained with ________ in mind
organizational risk
57
confidence is a quality measure that means what?
the delivered system will behave as specified
58
At the start of the development cycle, the confidence gap is ______
large
59
reliability depends on
identifying and mitigating potential faults
60
how can assurance be defined?
"a documented body of evidence that provides a convincing and valid argument that a specific set of critical claims about a system's properties are adequately justified for a given application in a given environment." (Kelly 1998)
61
Assurance reviewers may doubt the _______, ________, and _______
claim, argument, evidence
62