Domain 3 - Security Architecture and Engineering Flashcards

1
Q

Zero Trust Security

A

○ Addresses limitations of legacy network perimeter-based security model
○ Treats user identity as the control plane
Assumes compromise/ breach in verifying every request, no entity is trusted by default, verify identity, manage device, manage apps, protect data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Secure defaults (secure design principles)

A

default configuration reflects a restrictive and conservative enforcement of security policy, taken from NIST 800-160

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fail securely (secure design principles)

A

default configuration reflects a restrictive and conservative enforcement of security policy, taken from NIST 800-160

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trust but verify (secure design principles)

A

depends on initial authentication process to gain access to the internal “secured” environment then relied on generic access control methods, taken from NIST 800-160, given way to zero trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privacy by design (secure design principle)

A

making privacy and integral part of every system, tech, policy, and design process
§ Proactive and not reactive approach
§ Privacy as the default setting
§ Privacy embedded into design, not added later
§ Privacy should be positive-sum approach, not zero-sum, needs of everybody are met
§ End to end full lifecycle data protection
§ Visibility and transparency, i.e. privacy policy explaining what company does with data
Keep privacy user-centric, i.e. in GDPR the customer can request data and tell them to “forget” them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security-aaS

A

cloud provider concept in which security is provided to an org through and online entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

internet of things (IoT)

A

class of devices connected to internet in order to provide automation, remote control, or AI processing in home or business, plugs, thermostats, speakers, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SIEM

A

sec information and event management, collects data from many sources, provides real time monitoring, traffic analysis of potential attacks, often use AI, ML and threat intel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SOAR

A

sec orchestration automation and response, threat specific playbooks, response may be fully automated or single click, domain 8, delivered with SIEM typically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Microservices

A

fine grained services with a discrete function, more modern version of SOA to cloud computing, run on Docker/ kubernetes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SOA (service oriented architecture)

A

creation of discrete services that may be accessed by users in black box fashion (don’t know whats going on under the hood)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

code level vulnerabilities

A

should be identified early in development lifecycle via static code analysis and dynamic testing to identify deficiencies before release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

containerization

A

lightweight, granular, portable way to package apps for multiple platforms, reduces overhead of server virtualization by enabling containerized apps to run on a shared OS kernel, containers don’t have their own OS, sharing OS of host, test focuses on devops security (container level) and application level security (Authentication and Authorization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

API

A

set of exposed interfaces allow for program interaction between services, REST uses HTTPS for web comms to offer API end points, all comms between client and server should be encrypted and access limited with API keys, storage/ dist/ transmission of access keys should be done in secure fashion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Embedded Systems

A

tech component of an IOT device, full computer system embedded inside a larger system, ie printers/ drones/ semi autonomous vehicles, consider authentication practices to ensure they meet security best practices (avoid implied trust)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

high performance computing

A

alternative to client/ server computing model for intensive operations with large data sets, for problems that require large-scale parallel processing, SETI project where individuals can volunteer their compute time i.e. grid computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

grid computing

A

employs a centralized controller that makes computing assignments to grid members, secure the grid controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

edge computing

A

some compute operations require processing activities to occur locally not in the cloud, common in IOT scenarios like agricultural, science/ space, military, ie watering plants in a field by sensing moisture, kiosk in a drug store, consider encryption, spoofing protection and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

fog computing

A

places gateway devices in the field to collect and correlate data centrally at the edge, version of edge computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Serverless (Function as a service FaaS)

A

different that PaaS, more granular, less decisions around service tier and scale, azure functions and AWS Lambda

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IaaS

A

CSP: networking, storage, servers, virtualization

You: OS, middleware, runtime, data, apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PaaS

A

CSP: networking, storage, servers, virtualization, OS, middleware, runtime

You: data, apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SaaS

A

CSP: networking, storage, servers, virtualization, OS, middleware, runtime, data, apps

You: n/a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Public cloud

A

everything runs on CSPs hardware, advantages include scalability, agility, pay as you go, no maintenance, low skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Private cloud
cloud environment in your own datacenter, legacy support (can support older versions vs public which will typically always be latest versions), control, compliance
26
Hybrid (cloud model)
combines public and private allowing every app to run in the right location, connect the 2 clouds with VPN, flexible in legacy, compliance, and scalability
27
CASB
cloud access security broker, security policy enforcement solution, ie ensuring specific users only use the applications we have in place, prevent sensitive information from being shared externally, solves problem of shadow IT
28
Post quantum cryptography
development of new kinds of cryptographic approaches that can be implemented using todays conventional computers, but will be resistant to quantum computing attacks of the future
29
Symmetric encryption (shared key)
bulk encryption, fast, holds up well to quantum, uses 1 shared secret key
30
Grovers algorithm
quantum computer speeds up attacks to halve the key length, 256 bit key is as strong against quantum as 128 bit
31
Shors algorithm
quantum can easily break all commonly used PK alogorithms, RSA is vulnerable, Elliptic curve is vulnerable, Lattice offers some resistance against quantum
32
lattice
makes up most publications on post-quantum cryptography, QUANTUM RESISTANT
33
Stream cipher
symmetric key, one character at a time
34
Block cipher
crypto key and algo are applied to a block of data at once as a group
35
Substitution cipher
replace each character with a different character
36
transposition
rearrange the letters of a plaintext message to form ciphertext
37
Initialization vector (IV)
random bit string (nonce) that is XORed with the message to reduce predictability and repeatability, same length as the block size or as large as the encryption key
38
Caesar, vigenere, one-time pad
similar STREAM ciphers, difference is key length, caeser=1, vigenere=longer key like a word/ sentence, one-time pad=same length as the message
39
one time pad
key must be generated randomely, as long as message to be encrypted, pads be protected against disclosure, pad must be used one-time then discarded
40
zero knowledge proof
communication concept, specific type of info is exchanged but no real data is transferred, ie digital signature and digital certificate, enables one to prove knowledge of a fact without revealing the fact
41
split knowledge
information/ priv required to perform an operation is divided among multiple users, ensures no single person has sufficient priv to compromise security, role seperation
42
work function
aka work factor, measure strength of crypto system by measuring cost/ time to decrypt, work function rating typically represents the amount of time to complete a brute-force attack against a crypto system, TIME AND EFFORT TO BREAK A PROTECTIVE MEASURE
43
key security
crypto keys provide security to crypto system, modern systems utilize keys of at least 128 bits
44
symmetric encryption
shared secret key, faster, lacks support for scalability/ easy key distro/ nonrepudiation AES > block > 128 Blowfish > 64 DES > block > 64 > weak 3DES > block > 64 > moderate RC4 > stream cipher RC5 > RSA block mode cipher > 32/63/128 > VERY strong Skipjack > 64 Twofish > 128
45
Asymmetric
PKI for communication between parties, supports scalability, easy key distribution, and nonrepudiation, public and private key pairs, stronger than symmetric, encrypt with recipients public key, digital signature signed with own private key RSA > key transport > 512 > strong Diffie Hellman > key exchange > moderate El Gamal > key exchange > very strong ECC > elliptic curve > very strong
46
Electronic Codebook Mode (ECB)
DES/3DES mode simplest and least secure, 64-bit blocks, easy to break
47
Cipher block chaining (CBC)
DES/3DES mode each block of unencrypted text is XORed w/ block of ciphertext immediately preceding. Decryption process simply decrypts ciphertext and reverse the XOR operation,
48
Cipher feedback (CFB)
streaming version of CBC, works on data in real time, uses chaining so errors propogate
49
Output feedback (OFB)
operates similar to CFB but XORs plaintext with a seed value, no chaining function so errors do not propogate
50
Counter (CTR)
incrementing value instead of a seed, errors do not propogate
51
XOR Cipher
exclusiveOR, flipping bits in a simple systemic fashion, when values match = 1, when values don't match = 0.
52
Key clustering
weakness where plaintext message generates identical ciphertext message using same algo but different keys, similar to hash collision, same reason why MD5 is no longer used
53
Hash functions
allow input of any length, provide fixed length output, easy to compute hash function, must be irreversible, must be collision free. MD5 not used anymore, sha-256 is the standard HMAC - variable hash value length > very strong MD5 > 128 > weak SHA1 > 160 > weak SHA2 > 256 > strong > current standard SHA3 > 384 > strong SHA5 > 512 > strong
54
Salt
random data added before hashing, reduces effectiveness of rainbow table attacks`
55
Digital signature standard (DSS)
uses SHA-1, SHA-2 (must use SHA-256 these days), and SHA-# message digest functions, works with Digital signature algo (DSA), Rivest, Shamir, Adleman (RSA) algo, and Eliptic Curve DSA (ECDSA) algo, FIPS-186-4 (digital signature standard)
56
PKI
Certificate authorities (CAs) generate digital certificates containing public keys of system users, Users then distribute certificates to people with whom they want to communicate, recipients verify a certificate using CAs public key, used for web/ network/ email security
57
Email encryption
standards for encrypted messages include S/MIME and Pretty Good Privacy (PGP)
58
Web encryption
standard is HTTP over TLS (HTTPS), this has replaced SSL
59
Network encryption
Ipsec is standard
60
IPsec
secure communication over IP, transport mode or tunnel mode, establish direct communication between computers or over VPN, windows OS can Ipsec between computers, uses 2 protocols - Authentication header (AH) and encapsulating security payload (ESP)
61
Meet in the middle attack
exploits protocols using 2 rounds of encryption
62
Man in the middle attack
fools both parties into communicating with the attacker instead of directly with each other
63
Birthday attack
attempts to find collisions in hash functions
64
Replay attack
attempt to reuse authentication requests
65
Digital rights management (DRM)
allows content owners to enforce restrictions, common in entertainment ie music/ movies/ books, occasionally found in enterprise to protect sensitive info
66
Rivest, Shamir, and Adleman (RSA)
most famous public key crypto system
67
El Gamal
Public key cryptosystem, Based on Diffie-Hellman key exchange, less common than RSA
68
Elliptic Curve
public key cryptosystem, provides more security than other algos with same length key
69
Security Model
formalize security policy, implemented by enforcing integrity, confidentiality, or other controls, lay out broad guidelines (not specific), up to the developer to decide how models will be integrated into specific designs, map abstract statements into sec policy, determines what subjects can access system and what objects they will have access to
70
Simple security property (sec model)
describes rules for read, subject cannot read data at a higher classification level (no read up)
71
Star * security property (sec model)
describes rules for write
72
Invocation property (sec model)
rules around invocation (calls), such as to subjects
73
State machine (sec model)
system that is always secure no matter what state its in, based on finite state machine (FSM), "state" is a snapshot of a system at a moment in time, all state transitions must be evaluated, if each transition results in a secure state then the system is a "secure state machine",
74
Information flow model
focuses on flow of information, Biba and Bell-Lapadula
75
Bell-LaPadula (sec model)
prevent info flow from high security to low security level, no read up no write down, CONFIDENTIALITY, government (DoD), uses mandatory access control (MAC) to enforce DoD multilevel sec policy, simple security property and star * sec property, no read up no write down, lattice based
76
Biba (sec model)
focuses on flow from low to high security level, INTEGRITY, no read down no write up, simple integrity property (no read down), star * integrity property (no write down), lattice based, invocation property prohibits subject from invoking subject at a higher integrity level
77
Non-interference (sec model)
how actions of a subject at a higher security level affect the system or actions of a subject at a lower security level, ensures that actions of different objects/ subjects arent seen by/ interfere with other objects/ subjects on the same system
78
Lattice (sec model)
based on interaction between objects (resources, computers, and applications) and subjects (individuals, groups, organizations), used to define levels of security that an object may have and that a subject may have access to
79
Clark Wilson (sec model)
access control triple, INTEGRITY, uses security LABELS to grant access, constrained data item (CDI), unconstrained data item (UDI), integrity verification procedure (IVP), Transformation procedures (TPs), access control triplet!!
80
Goguen-Meseguer (sec model
THE non-interference model, INTEGRITY
81
Sutherland (sec model)
preventing interference (Information flow and SMM)
82
Brewer and Nash (sec model)
Chinese wall, CONFIDENTIALITY, prevent conflict of interest problems
83
Take Grant (sec model)
employs a directed graph, CONFIDENTIALITY, 4 operations (take, grant, create, and revoke)
84
Constrained data item (CD)
Clark Wilson model, any data item whose integrity is protected by the sec model
85
Unconstrained data item (UDI)
Clark Wilson model, any data item that is not controlled by the sec model
86
Integrity verification procedure (IVP)
Clark Wilson model, scans data items and confirms integrity
87
Transformation procedures (TPs)
Clark Wilson model, procedures that are allowed to modify a constrained data item (CDI)
88
Access control triplet
authenticated principal (subjects/ users) > programs (transformational procedures) > data items (Objects/ UDIs/ CDIs), refers to relationship between users, programs and a set of data items, used in Clark Wilson model
89
Graham-Denning (sec model)
protections rules where each object has an owner and a controller, focused on secure creation and deletion of both subjects and objects, 8 primary protection rules that define the boundaries of certain secure actions, securely create object/ subject, securely delete object/ subject, securely provide the read/ grant/ delete/ transfer access right
90
Dedicated mode (sec modes)
clearance that permits access to ALL info, approval for ALL info, valid need-to-know for ALL info
91
Multilevel mode (sec modes)
can process info at different levels even when all system users do not have required sec clearance
92
System high mode (sec modes)
each user must have valid clearance, access approval for ALL info, and valid need-to-know for SOME info on a system. Offers most GRANULAR control over resources and users of these models
93
Compartmented mode (sec modes)
one step further than system high, each user must have valid clearance, access approval for ALL INFO processed by a system, but requires valid need to know for ALL INFO they will have access to on the system
94
Trusted Computing Base (TCB)
combo of hardware, software, and controls that work together to form a "trusted base" that enforces sec policy, subset of the complete information system, portion that can be trusted to adhere/enforce sec policy, separated by a security perimeter from the untrusted parts of the system, creates secure channels to communicate w/ rest of system
95
Reference monitor
logical part of TCB that confirms whether subject has right to use a resource prior to granting access, ENFORCES ACCESS CONTROL
96
security kernel
collection of TCB components that implement the functionality of the reference monitor, IMPLEMENTS ACCESS CONTROL
97
Common Criteria (ISO-IEC 15408)
enable objective evaluation to validate a product/ system satisfies a defined set of sec requirements, gold standard, has replaced BOTH TCSEC and ITSEC 1. description of assets 2 identification of threats 3 analysis and rating of threats 4 determination of sec operations 5 selection of sec functional requirements levels 1 through 7 vary from minimal/no protection up to verified security design
98
Community protection profile (cPP)
flavor of common criteria (ISO-IEC 15408), black box
99
Evaluation assurance level (EAL)
flavor of common criteria (ISO-IEC 15408), white box, see chart below!! White box
100
Trusted Computer System Evaluation Criteria (TCSEC)
set of criteria for evaluation computer sec within products and systems, REPLACED BY COMMON CRITERIA
101
Information Technology Security Evaluation Criteria (ITSEC)
represents initial attempt to create sec evaluation criteria in Europe. ITSEC uses 2 scales to rate functionality and assurance, REPLACED BY COMMON CRITERIA
102
Covert Channel
method to pass info over a path that is not normally used for comms, since its not used it may not be protected by sec controls, i.e. steganography, 2 types: covert timing and covert storage
103
Trusted Platform Module (TPM)
chip that lives on motherboard, storage/ management of keys used for disk encryption, provides OS with access to keys but prevents drive removal and data access
104
Mandatory Access Control (MAC)
enforces access policy determined by the system not the object owner, relies on classification labels that are representative of sec domains and realms, every object/ subject has one or more labels, labels are predefined and system determines access based on labels
105
Hierarchical environment (MAC type)
classification labels are assigned in an ordered structure from low to medium to high security, type of MAC
106
Compartmentalized environment (MAC type)
requires security clearances over compartments/ domains instead of objects, type of MAC
107
Hybrid Environment (MAC type)
contains levels with compartments that are isolated from the rest of the sec domain, combines both hierarchical and compartmentalized environments so that sec levels have sub compartments, type of MAC
108
Discretionary Access Control (DAC)
permits owner of an object to control/ define its accessibility, because the owner has full control by default, at the discretion of the owner
109
Non-Discretionary access control (NDAC)
enables enforcement of system-wide restrictions that override object specific access control
110
Role based access control (RBAC)
well-defined collection of named job roles to endow each one with specific permissions, ensures users in each role have access to get their jobs done, i.e. global admin/ security reader/ normal user
111
Certification
technical evaluation of each part of a comp system to assess its alignment with sec standards
112
Accreditation
formal acceptance of certified configuration from a designated authority
113
Open system
designed using industry standards, easy to integrate with other open systems
114
Closed system
proprietary hardware and software, specifications are not normally published, harder to integrate with other systems
115
Confinement
restricts process to reading from and writing to certain memory locations
116
Bounds
are the limits of memory a process cannot exceed when reading or writing
117
Isolation
mode a process runs in when it is confined through the use of memory bounds
118
MFA
something you know (pin or password), something you have (trusted device), something you are (biometric)
119
Authentication (AuthN)
process of proving that you are who you say you are, IDENTITY
120
Authorization (AuthZ)
act of granting an authenticated party permission to do something, ACCESS
121
Multitasking
simultaneous execution of more than one application on a comp and is managed by the OS
122
Multithreading
permits multiple concurrent tasks to be performed within a single process
123
Multiprocessing
use of more than one processor to increase compute power
124
Multiprogramming
similar to multitasking, takes place on mainframe systems and requires specific programming, MULTITASKING FOR MAINFRAME
125
Single vs Multi state processors
operate at only one security level at a time vs multiple sec levels
126
User mode (processor operating)
apps operate in a limited instruction set environment known as user mode, normal end user operations
127
Privileged mode (processor operating)
controlled ops are performed in privileged mode aka system mode, kernel mode, supervisory mode
128
Read only memory (ROM)
contents burned in at factory, read only
129
RAM
static RAM (SRAM) uses flip flops, dynamic RAM (DRAM) uses capacitors
130
PROM
programmable chip similar to ROM, subtypes: erasable (EPROM) for overwriting with unclassified data, Ultraviolet (EPROM) uses UV light to erase, Electronically erasable PROM (EEPROM) uses electrical voltage to erase
131
Flash memory
derivative of EEPROM, nonvolatile, can be electronically erased and rewritten
132
Primary storage
same as memory
133
Secondary storage
consists of magnetic, flash, and optical media that must first be read into primary memory before the CPU can use the data, 3 SECURITY ISSUES: removable media can be used to steal data ie USB drives, access controls and encryption must be applied to protect data, data can remain after deletion/ formatting
134
Random access storage
devices can be read at any point
135
Sequential access storage
require scanning through all the data physically stored before the desired location
136
Firmware
software stored on a ROM chip containing basic instructions to start computer, provide OS instructions in peripherals like printers/ keyboards etc
137
Process isolation
ensures that individual processes can only access their own data
138
Layering
creates different realms of security within a process and limits comms between them
139
Abstraction
creates a black box interface for programmers to use without requiring knowledge of algo/ devices inner workings
140
Data hiding
prevents info from being read at a different sec level, hardware segmentation enforces this with physical controls
141
Security policy
inform design/ development/ implementation/ testing/ maintenance of systems,
142
cloud computing
processing/ storage are performed over a network connection instaed of locally (Azure, AWS, GCP)
143
Hypervisors
Virtual machine management/ creator/ operator, Type 1 = 1 bare metal, type 2 = runs on a standard OS and the hypervisor is an app ie virtualbox/ vmware workstation
144
CASB
cloud access sec broker, sec policy enforcement, prevents shadow IT, installed on-prem or in the cloud, ensure only secure apps are used in your environment, ensure data is not stored in unauthorized repos (only approved storage locations)
145
Security-aaS
security is provided to an org by an online entity
146
Smart devices
mobile devices offering app installs, may use on-device or cloud AI processing
147
IoT
class of devices connected to internet to provide automation, remote control, or AI processing in a home/ business ie smart switches/ thermostats/ alexa/ cars
148
Mobile device security
encryption, remote wiping (can be selective for business data), screen locking, GPS, app control, apps and functions NEED TO BE SECURED, concepts include key management/ cred management/ authentication/ geotagging/ encryption/ app whitelisting/ transitive trust and authentication
149
BYOD
policy that allows employees to use their personal mobile devices to access business info/ resources, may improve morale but INCREASES SEC RISKS, MDM platforms like intune offer solutions
150
Embedded system
designed around a limited set of specific functions, in relation to the larger product of which it’s a component, ie motion sensors/ lighting system/ wifi routers/ cash registers
151
Static environments
apps/ Oss/ hardware sets/ networks that are configured for a specific need, capability, or function and then set to remain UNALTERED
152
Least privilege
ensures a minimum number of processes are authorized to run in supervisory/ system mode, also applies to role based access where people are given what they need to do their jobs and not more
153
Separation of privilege
separating privs that any one entity can perform, aka role separation
154
accountability
ensures that an audit trail exists
155
Buffer Overflow
occurs when programmer fails to check size of input data prior to writing data into a specific memory location, overwrites the bounds of memory for which it has been granted access, programmers can also leave backdoors and privileged programs on system after deployment, some systems are susceptible to time-of-check-to-time-of-use (TOTTOU) attacks where state change presents opportunity for attacker to compromise system
156
time-of-check-to-time-of-use (TOTTOU) attacks
where state change presents opportunity for attacker to compromise system
157
Order of sec controls
as each one fails they move to the next Deterrence > denial > detection > delay > determine (what is occuring) > decide (whether to aprehend, collect evidence)
158
Administrative controls
(site management/ personnel controls/ awareness training/ emergency response and procedures/facility selection and management/ policy)
159
Logical/ Technical Controls
(access control/ IDS/ alarms/ CCTV/ fire detection)
160
Physical controls
for physical security, fences/lights/locks/mantraps/dogs/guards, VERY IMPORTANT, no amount of admin or logical/technical controls can provide adequate security without control over physical environment!!
161
Fence heights
deter casual trespasser (3-4 feet), too hard to climb easily (6-7 feet), will deter intruders (8 feet+ with barbed wire)
162
Temp (physical security)
humidity (40-60%, any higher causes corrosion any lower causes static), temps for computers 60-75 F damaged at 175F, storage devices damaged at 100F
163
Electrical impacts (physical security)-
blackout=prolonged loss of power, brownout=prolonged low voltage, fault=short loss of power, surge=prolonged high voltage, spike=temporary high voltage, sag=temporary low voltage
164
Lights (physical security)
8 feet high with 2 feet candle power
165
Fire suppression
Class A (ASH)=common combustibles ie wood/paper=extinguish with water or soda acid, Class B (BOIL)=burning alcohol/oil/other petroleum=extinguish with gas or soda acid NOT water, Class C (CONDUCTIVE)=electrical=extinguish with any type of gas, Class D (DILYTHIUM)=burning metals=extinguished with dry powder, Class K (KITCHEN)=oil or grease=extinguish with wet chemicals
166
Fire detection
smoke, heat, or flame sensing
167
Fire damage
smoke damages storage devices, heat damages electronics, suppression mediums can cause short circuits
168
Water based fire suppression
preaction systems= BEST FOR COMPUTER SYSTEMS closed sprinkler heads, pipe is charged with compressed air instead of water / wet pipe systems=filled with water, dry pipe systems= compressed air until water is needed (useful for parking garages etc where water freezes) / Deluge systems=sprinkler heads are open and larger than dry pipe heads, empty at normal air pressure and water is held back by deluge valve / NOT FOR ELECTRICAL FIRES
169
Gas discharge systems
more effective than water but shouldn’t be used near people because it removes O2 from the air, Halon is effective but bad for environment and toxic at over 900F, Halon replacements = FM-200, CEA-410, NAF-S-III, FE-13, ARGON, Inergen, Aero-K
170
Electromagnetic interference
common mode noise=difference in power between hot and ground wires of a power source operating electrical equipment, traverse mode noise=difference in power between hot and neutral wires of a power source operating electrical equipment,
171
Radio frequency interference (RFI)
generated by electrical applicances/ light sources/ cables/ circuits/ etc.
172
Static voltages
40 - destroys sensitive circuits 1000 scrambles monitors 1500 destroys hard drive data 2000 abrupt shutdown 4000 printer jam 17000 - permanent circuit damage
173
Locks
○ Electronic combo locks - aka cipher lock, something you KNOW ○ Key card systems - something you HAVE ○ Biometric systems - something you ARE Conventional locks - easily picked/ bumped, keys easily duplicated, least secure, pick and bump resistant exist
174
site selection
visibility, accessibility, effects of natural disasters
175
facility design
understand level of security needed and plan for it before construction begins
176
secure work area
should NOT be equal access to all locations, high value assets require restricted access, should be located at CENTER OF PROTECTION, centralized server rooms don’t need to be human compatible
177
Threats to physical access controls
propping doors, bypassing locks or access controls, masquerading is using someone elses ID, guard or monitoring system MUST be present, piggybacking/ tailgating is following someone through secure gateway/ doorway
178
Visitors
assign an escort, monitor activities and access, badges
179
evidence logs
used to retain logs, drive images, VM snapshots, PROTECTIONS INCLUDE: locked cabinets/ safes, dedicated isolated storage facilities, offline storage, access restrictions and activity tracking, hash management and encryption
180
`audit trails/ access logs
useful for managing physical access control, may need to be created manually by security guards or automatically by smartcards etc, monitor with CCTV, important to reconstruct the events of an intrusion/ attack
181
clean power
most electronic equipment requires clean power, UPS self charging battery that can supply consistent clean power to sensitive equipment, can supply power for minutes or hours depending on size, then generators after that
182
open relay (SMTP)
does not authenticate users before relaying their message, if internet exposed they are typically quickly exploited
183
motion detector
capacitance=electromagnetic field
184
X.509
governs digital certificates and PKI, defines processes used by CAs, international telecommunications union (ITU) standard