Domain 2: Architecture and Design (21%) Flashcards

1
Q

*2.4 (AAA)

Authentication

A

when a person’s identity is established with proof and confirmed by a system.

Remember
something you know, something you are, something you have, something you do, and somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

*2.4 (AAA)

Authorization

A

occurs when a user is given access to a certain piece of data or certain areas of a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

*2.4 (AAA)

Accounting

A

Tracking of data, computer usage, and network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

*2.8 Common use cases

non-repudiation

A

when you have proof that someone has taken an action.

You said it. You can’t deny it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

*2.5 Backup types

Network Attached Storage (NAS)

A

Storage devices that connect directly to your organization’s network.

*File level access

NAS systems often implement RAID arrays to ensure high availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

*2.5 Backup types

Storage Area Network (SAN)

A

Network designed specifically to perform block storage functions that may consist of NAS devices.

*Block level access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

*2.6 Communication considerations

Subscriber Identity Module (SIM)

A

An integrated circuit that securely stores the international mobile subscriber
identity (IMSI) number and its related key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

*2.6 Embedded systems

Field-programmable gate array (FPGA)

A

-FPGA is an anti-tamper mechanism. (sealed aspirin bottle example, seal is anti-tamper mechanism)

-An anti-tamper mechanism is a method that makes it difficult for an attacker to alter the authorized execution of software.

if somebody tries to tamper with the system,
what these things will do is actually zero out your cryptographic key, which then can automatically wipe out the information on that system, making sure you know it’s been tampered with and therefore, nobody can get the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

*2.2 Virtualization

VM sprawl avoidance

A

Occurs when virtual machines are created, used, and deployed without
proper management or oversight by the system admins.

The solution is Formal process and detailed documentation
– You should have information on every virtual object.

To avoid VM sprawl and maintain a manageable attack surface, it is important to set resource policies that limit users’ ability to dynamically allocate new resources on the fly. This also avoids the potential pitfall of the organization receiving a whopping bill after unknown or unplanned resources have been consumed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

*2.2 Virtualization

VM escape protection

A

An attack that allows an attacker to break out of a normally isolated VM
by interacting directly with the hypervisor.

Pretection: sandboxing, patching the hypervisor and continuous monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

*2.3 Automation/scripting

Continuous integration

A

A software development method where code updates are tested and
committed to a development or build server/code repository rapidly

§ Continuous integration can test and commit updates multiple times per
day

§ Continuous integration detects and resolves development conflicts early
and often

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

*2.3 Automation/scripting

Continuous delivery

A

A software development method where application and platform
requirements are frequently tested and validated for immediate
availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

*2.3 Automation/scripting

Continuous deployment

A

A software development method where application and platform
updates are committed to production rapidly

§ Continuous delivery focuses on automated testing of code in order to get
it ready for release

§ Continuous deployment focuses on automated testing and release of
code in order to get it into the production environment more quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

*2.2 Infrastructure as code

A

§ A provisioning architecture in which deployment of resources is performed by scripted automation and orchestration

§ IaC allows for the use of scripted approaches to provisioning
infrastructure in the cloud

§ Robust orchestration can lower overall IT costs, speed up deployments,
and increase security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

*2.4 Biometrics

False Acceptance

A

False Acceptance Rate (FAR): Rate that a system authenticates a user as authorized or valid when they
should not have been granted access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2.4 *Biometrics

False Rejection

A

False Rejection Rate (FRR): Rate that a system denies a user as authorized or valid when they should
have been granted access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

2.4 *Biometrics

Crossover Error rate

A

Crossover Error Rate (CER):

An equal error rate (ERR) where the false acceptance rate and false

rejection rate are equal
§ CER measures the effectiveness of a biometric system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

2.7 *Bollards/barricades

A

Bollards are a physical security control that is designed to prevent a vehicle-ramming attack. Bollards are typically designed as a sturdy, short, vertical post. Some organizations have installed more decorative bollards that are created out of cement and are large enough to plant flowers or trees inside. Mantraps are designed to prevent individuals from tailgating into the building. Security guards and intrusion alarms could detect this from occurring, but not truly prevent them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

2.7 *Fire supression

A

§ Process of controlling and/or extinguishing fires to protect an
organization’s employees, data, equipment, and buildings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

2.7 *Faraday Cages

A

Faraday Cage

Shielding installed around an entire room that prevents electromagnetic
energy and radio frequencies from entering or leaving the room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

2.6 Heating, ventilation, air conditioning (HVAC)

A

Heating, Ventilation, and Air Conditioning

o Humidity should be kept around 40%

o HVAC systems may be connected to ICS and SCADA networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

2.6 *Internet of Things (IoT)

A

A group of objects (electronic or not) that are connected to the wider
Internet by using embedded electronic components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

2.6 *System on Chip

A

A processor that integrates the platform functionality of multiple logical
controllers onto a single chip

System-on-Chip are power efficient and used with embedded systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

2.6 *Real-Time Operating System (RTOS)

A

A type of OS that prioritizes deterministic execution of operations to
ensure consistent response for time-critical tasks

Embedded systems typically cannot tolerate reboots or crashes and must
have response times that are predictable to within microsecond
tolerances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
2.6 Embedded Systems *Field-programmable gate array (FPGA)
A processor that can be programmed to perform a specific function by a customer rather than at the time of manufacture End customer can configure the programming logic to run a specific application instead of using an ASIC (application-specific integrated circuit)
26
2.6 *Industrial Control Systems (ICS)
A network that manages embedded devices. ICS is used for electrical power stations, water suppliers, health services, telecommunications, manufacturing, and defense needs.
27
2.6 *Supervisory Control and Data Acquisition (SCADA)
A type of industrial control system that manages large-scale, multiple-site devices and equipment spread over geographic region SCADA typically run as software on ordinary computers to gather data from and manage plant devices and equipment with embedded PLCs
28
2.4 Authentication methods *Time-based one-time password (HOTP)
A password is computed from a shared secret and current time
29
2.4 Authentication methods HMAC-based One Time Password (HOTP)
A password is computed from a shared secret and is synchronized between the client and the server
30
2.4 Authentication methods *Attestation
A claim that the data presented in the report is valid by digitally signing it using the TPM’s private key.
31
when a person's identity is established with proof and confirmed by a system. Remember something you know, something you are, something you have, something you do, and somewhere you are
*2.4 (AAA) Authentication
32
occurs when a user is given access to a certain piece of data or certain areas of a building.
*2.4 (AAA) Authorization
33
Tracking of data, computer usage, and network resources.
*2.4 (AAA) Accounting
34
when you have proof that someone has taken an action. You said it. You can't deny it
*2.8 Common use cases non-repudiation
35
Storage devices that connect directly to your organization’s network. *File level access NAS systems often implement RAID arrays to ensure high availability.
*2.5 Backup types Network Attached Storage (NAS)
36
Network designed specifically to perform block storage functions that may consist of NAS devices. *Block level access
*2.5 Backup types Storage Area Network (SAN)
37
An integrated circuit that securely stores the international mobile subscriber identity (IMSI) number and its related key.
*2.6 Communication considerations Subscriber Identity Module (SIM)
38
-FPGA is an anti-tamper mechanism. (sealed aspirin bottle example, seal is anti-tamper mechanism) -An anti-tamper mechanism is a method that makes it difficult for an attacker to alter the authorized execution of software. if somebody tries to tamper with the system, what these things will do is actually zero out your cryptographic key, which then can automatically wipe out the information on that system, making sure you know it's been tampered with and therefore, nobody can get the information.
*2.6 Embedded systems Field-programmable gate array (FPGA)
39
Occurs when virtual machines are created, used, and deployed without proper management or oversight by the system admins. The solution is Formal process and detailed documentation – You should have information on every virtual object. To avoid VM sprawl and maintain a manageable attack surface, it is important to set resource policies that limit users’ ability to dynamically allocate new resources on the fly. This also avoids the potential pitfall of the organization receiving a whopping bill after unknown or unplanned resources have been consumed.
*2.2 Virtualization VM sprawl avoidance
40
An attack that allows an attacker to break out of a normally isolated VM by interacting directly with the hypervisor. Pretection: sandboxing, patching the hypervisor and continuous monitoring.
*2.2 Virtualization VM escape protection
41
A software development method where code updates are tested and committed to a development or build server/code repository rapidly § Continuous integration can test and commit updates multiple times per day § Continuous integration detects and resolves development conflicts early and often
*2.3 Automation/scripting Continuous integration
42
A software development method where application and platform requirements are frequently tested and validated for immediate availability
*2.3 Automation/scripting Continuous delivery
43
A software development method where application and platform updates are committed to production rapidly § Continuous delivery focuses on automated testing of code in order to get it ready for release § Continuous deployment focuses on automated testing and release of code in order to get it into the production environment more quickly
*2.3 Automation/scripting Continuous deployment
44
§ A provisioning architecture in which deployment of resources is performed by scripted automation and orchestration § IaC allows for the use of scripted approaches to provisioning infrastructure in the cloud § Robust orchestration can lower overall IT costs, speed up deployments, and increase security
*2.2 Infrastructure as code
45
False Acceptance Rate (FAR): Rate that a system authenticates a user as authorized or valid when they should not have been granted access to the system
*2.4 Biometrics False Acceptance
46
False Rejection Rate (FRR): Rate that a system denies a user as authorized or valid when they should have been granted access to the system
2.4 *Biometrics False Rejection
47
Crossover Error Rate (CER): An equal error rate (ERR) where the false acceptance rate and false rejection rate are equal § CER measures the effectiveness of a biometric system
2.4 *Biometrics Crossover Error rate
48
Bollards are a physical security control that is designed to prevent a vehicle-ramming attack. Bollards are typically designed as a sturdy, short, vertical post. Some organizations have installed more decorative bollards that are created out of cement and are large enough to plant flowers or trees inside. Mantraps are designed to prevent individuals from tailgating into the building. Security guards and intrusion alarms could detect this from occurring, but not truly prevent them.
2.7 *Bollards/barricades
49
§ Process of controlling and/or extinguishing fires to protect an organization’s employees, data, equipment, and buildings
2.7 *Fire supression
50
Faraday Cage Shielding installed around an entire room that prevents electromagnetic energy and radio frequencies from entering or leaving the room
2.7 *Faraday Cages
51
Heating, Ventilation, and Air Conditioning o Humidity should be kept around 40% o HVAC systems may be connected to ICS and SCADA networks
2.6 Heating, ventilation, air conditioning (HVAC)
52
A group of objects (electronic or not) that are connected to the wider Internet by using embedded electronic components
2.6 *Internet of Things (IoT)
53
A processor that integrates the platform functionality of multiple logical controllers onto a single chip System-on-Chip are power efficient and used with embedded systems
2.6 *System on Chip
54
A type of OS that prioritizes deterministic execution of operations to ensure consistent response for time-critical tasks Embedded systems typically cannot tolerate reboots or crashes and must have response times that are predictable to within microsecond tolerances
2.6 *Real-Time Operating System (RTOS)
55
A processor that can be programmed to perform a specific function by a customer rather than at the time of manufacture End customer can configure the programming logic to run a specific application instead of using an ASIC (application-specific integrated circuit)
2.6 Embedded Systems *Field-programmable gate array (FPGA)
56
A network that manages embedded devices. ICS is used for electrical power stations, water suppliers, health services, telecommunications, manufacturing, and defense needs.
2.6 *Industrial Control Systems (ICS)
57
A type of industrial control system that manages large-scale, multiple-site devices and equipment spread over geographic region SCADA typically run as software on ordinary computers to gather data from and manage plant devices and equipment with embedded PLCs
2.6 *Supervisory Control and Data Acquisition (SCADA)
58
A password is computed from a shared secret and current time
2.4 Authentication methods *Time-based one-time password (HOTP)
59
A password is computed from a shared secret and is synchronized between the client and the server
2.4 Authentication methods HMAC-based One Time Password (HOTP)
60
A claim that the data presented in the report is valid by digitally signing it using the TPM’s private key.
2.4 Authentication methods *Attestation
61
Utilizes a keystream generator to encrypt data bit by bit using a mathematical XOR function to create the ciphertext
2.8 Cipher suites Stream Cipher
62
Breaks the input into fixed-length blocks of data and performs the encryption on each block Block ciphers are easier to implement through a software solution (Software Solution)
2.8 Cipher suites Block Cipher
63
The science and art of hiding messages within other messages § .... is a form of obfuscation, not encryption
2.8 Steganography
64
A one-way cryptographic function which takes an input and produces a unique message digest
2.8 Hashing 3.2 Database - Hashing
65
A technique that is used to mitigate a weaker key by increasing the time needed to crack it § WPA, WPA2, PGP, bcrypt, and other algorithms utilize key stretching
2.8 Key Stretching
66
Adding random data into a one-way cryptographic hash to help protect against password cracking techniques § A “nonce” is used to prevent password reuse
2.8 Salting 3.2 Database - Salting
67
prevent collisions from being used to spoof the integrity of a message use either DSA, RSA, ECDSA, or SHA
2.8 Digital signatures A digital signature is created by hashing a file and then taking that resulting hash digest and encrypting it with a private key.
68
Exposes the hard drive to a powerful magnetic field which in turn causes previously-written data to be wiped from the drive
2.7 Secure data destruction Degaussing