Chapter 9: Security Architectures Flashcards

(38 cards)

1
Q

Threat modeling

A

process of describing probable adverse effects on our assets caused by specific threat sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

attack tree

A

a graph showing how individual actions by attackers can be chained together to achieve their goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

STRIDE

A

threat modeling framework developed by Microsoft that evaluates a system’s design using flow diagrams, system entities, and event related to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lockheed Martin Cyber Kill Chain

A

identifies seven stages of cyberattacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MITRE ATT&CK framework

A

a comprehensive matrix of tactics and techniques used to model cyberattacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Defense in depth

A

the coordinated use of multiple security controls in a layered approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Zero trust

A

a model in which every entity is considered hostile until proven otherwise, and even that trust is limited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trust but verify

A

the principle that, even when an entity and its behaviors are trusted, we should double-check both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shared responsbility

A

a service provider is responsible for certain security controls, while the customer is responsible for others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Separation of duties

A

divides important functions among multiple individuals to ensure that one person has the ability to intentionally or accidentally cause serious losses to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Least privilege

A

people are granted exactly the access and authority they require to do their jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

need-to-know principle

A

similar to the least-privilege principle, based on the concept that individuals should be given access only to the information they absolutely require in order to perform their job duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

“keep it simple” principle

A

check we are not adding unnecessary complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

principle of secure defaults

A

every system starts off in a state where security trumps user friendliness and functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

principle of failing securely

A

in the event of an error, systems designed to behave in a predictable and noncompromising manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

principle of privacy by design

A

to ensure privacy of user data, incorporate data protection as an integral part of the design of a system; not as an afterthought or later-stage feature

17
Q

Bell-LaPadula model

A

enforces the confidentiality aspects of access control

18
Q

Biba model

A

security model addresses the integrity of data within a system but not concerned with security levels and confidentiality

19
Q

Brewer and Nash model

A

Chinese Wall model; subject can write to an object if, and only if, the subject cannot read another object that is in a different dataset

20
Q

TPM

A

Trusted Platform Module; carries out security functions: storage of cryptographic keys and digital certificates, symmetric and asymmetric encryption, and hashing

21
Q

HSM

A

hardware security module

22
Q

hardware security module

A

removable expansion card or external device to generate, store, and manage cryptographic keys to improve encryption/decryption performance of the system into it is installed

23
Q

SED

A

self-encrypting drive; provides FDE through cryptographic module integrated with the storage media into one package

24
Q

FDE

A

full disk encryption

25
Data in SEDs encrypted using ... key cryptography
symmetric key
26
Bus encryption systems
use TPMs to encrypt data and prior to being put on the internal bus, so they are also encrypted everywhere else except when data is being processed
27
TEE
trusted execution environment
28
trusted execution environment
secure enclave; software environment where special applications and resources (files) have undergone rigorous checks to ensure they are trustworthy and remain protected
29
processor security extensions
instructions that provide additional security features in the CPU and can be used to support a TEE
30
Atomic execution
controlling the manner in which sections of a program run so that they cannot be interrupted between the start and end of the section
31
STRIDE
developed by Microsoft; suitable for application to logical and physical systems alike
32
MITRE ATT&CK framework
maps cyberthreat actor tactics to the techniques used for them and the detailed procedures used by specific threat actors during cyberattacks
33
Data is encrypted in a self-encrypting drive system on
only on the disk drive; not in memory or on the bus
34
Data is encrypted in a bus encryption system on ...
everywhere except the cryptoprocessor where it is decrypted: on the disk drive, in memory, on the bus
35
TPM vs HSM
TPM permanently mounted on the motherboard and used for hardware-based assurance and key storage; HSM removable or external and used for both hardware accelerated cryptography and key storage
36
TPMs required features
storage of cryptographic keys and digital certificates, symmetric and asymmetric encryption, and hashing
37
changing a password on a self-encrypting drive does ...
the existing secret key is retained but is encrypted with the new password; encrypted data on the disk remains unaltered
38
Processor security extensions
enable developers to encrypt memory associated with a process; instructions for security features in CPU to support a TEE