Domain 3, Security architectures, designs, solution elements Flashcards

(100 cards)

1
Q

Modes of Operation (security)

A

Way of an operating system to work at certiain levels of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dedicated Mode

A

System contains objects of only one classification label. All subs must have clearance at least as high as the object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System High mode

A

contains mixed object levels. All subs must have clearance equal to the highest object classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compartmented mode

A

Ass subs have necessary clearance, but also are required to get formal access approval. Need to know. Compartmented information better allows for need to know access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multilevel mode

A

Contains mixed object classes. The Reference Monitor controlls access between subjects and objects. Ensures subjects can only access info at their level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Orange book

A

TCSEC, first security standard. Most concepts still in use today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCSEC

A

Trusted Comp System Evaluation Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Orange Book - Divisions

A

D- lowest
C
B
A - highest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Classes

A

i.e. C1, C2, A1, A2. Higher is more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TNI/Red book

A

Trusted Network INterpretation. Uses orange book concepts to apply to networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ITSEC

A

Information tech security evaluation criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ITSEC

A

first successful internation eval model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ITSEC Assurance ratings

A

E0 - E6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ITSEC Functionality rating

A

F-C1, F-c2, F-b1, F-b2, F-b3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

International Common Criterai

A

replaces ITSEC and TCSEC. Designed to evaluate commercial and govt systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Common Criteria ToE

A

Target of evaluation. System or product being evaluated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Common Criteria ST

A

Security Target. Documentation that describes the ToE, including sec requirements and operational env.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Protective Profile

A

unique set of sec. reqs for a specific category of products (i.e. firewall, end user pc, intrusion detect.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Eval Assurance Levvel

A

EAL = score of the tested product or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

EAL Levels

A

EAL1 through EAL7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

EAL1

A

Functionally tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

EAL2

A

Structurally tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

EAL3

A

Methodically tested and checked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

EAL4

A

methodically designed, tested, and and checked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
EAL5
semi formally designed and tested
26
EAL6
semi formally verified, designed, and tested
27
EAL7
Formally verified, designed, and tested.
28
Layering
separates hardware and software functionality into tiers
29
Example sec. architecture layers
1. Hardware 2. Kernel and drivers 3. OS 4. Apps
30
Abstraction
Hides unnecessary details from the user.
31
Sec. domains
list of objects a subject is allowed to access. Erros between domains don't affect each other.
32
Kernel Mode
sec. domain. where the kernel lives. allows low level access to memory, cpu, disk, etc.
33
User mode
sec. domain where users live.
34
Ring model
CPU Hardware layering that separates and protects domains.
35
Rings in the ring model
0 - kernel 1 - OS components not fitting in ring 0 2 - Device drivers 3 - User apps
36
System Call
Method for a process to communicate between rings.
37
Hypervisor ring
HV lives in ring 0
38
Open and closed systems
Open - windows, linux | Closed - MAC-OS
39
Sec Hardware Architecture
Focuses on applying CIA to physical components of a computer.
40
System Unit
Computer case
41
Motherboard
holds cpu, memory, firmware (bios), and connects to peripherals.
42
Computer Bus
primary comms channel on a computer system.
43
Northbridge
in system with two busses, AKA MCH Memory control unit connects CPU, RAM, and video cards.
44
Southbridge
ICH - input/output controller hub
45
southbridge
Connects to input output peripherals
46
CPU
- doi
47
ALU
subsystem of CPU. performas math processes. fed instructions by the Control unit
48
CU
subsystem of CPU. Acts as traffic cop for running processes.
49
Process steps
1. fetch inst. 2. decode inst. 3. execute instruction 4. write result
50
Fetch and Execute
CPU runs only one process at a time. Takes full clock cycle for one process.
51
pipelining.
way for CPU to work through multiple instructions at once. i.e. at the same time: 1. Fetching instruction 4 2. decoding instruction 3 3. executing instruction 2 4. writing instruction 1.
52
interrupts
Asynchronus event - causes CPU to stop what it's doing, do another process, then resume the task it was previously in the middle of.
53
Process
Executable program and its' associated data loaded and running in memory.
54
HWP
Heavy weight process AKA task.
55
Thread
a child process started from another 'parent' process. LWP.
56
LWP
light weight process - thread
57
Threads can ______ Memory
share.
58
Process states
New, ready, running, blocked, terminate
59
Process State - New
process is being created
60
Process State - Ready
process waiting execution by cpu
61
Process State - running
process is being executed
62
Process State - blocked
waiting for I/O
63
Process State - terminate
Process is completed
64
Multitasking
Allows cpu to run multiple tasks at once.
65
Multiprocessing
Runs multiple processes on multiple CPUs
66
SMP
Symmetric Multiprocessing - uses one OS for all CPUs
67
AMP
asymmetric multiprocessing. Uses one OS per CPU
68
CISC
Complex instruc. set computer uses large set of complex machine language instructions
69
RISC
Reduced instruct. set computer uses reduced set of simpler machine language instructions.
70
Direct Memory addressing
Address is based off of physical memory location.
71
Indirect memory addressing
address based off of memory reference
72
register direct addressing
register directly references memory location
73
register indirect addressing
register references another register memory location
74
Memory protection
Prevents one process from affecting the CIA of another process. Requirement for secure multi-user systems.
75
Process isolation
logical control that prevents a process from interfering with another process
76
Hardware segmentation
Further isolates processes by assigning them physically separate memory locations.
77
Virtual memory
provides virtual mapping between apps and system memory.
78
Swapping
uses virtual memory to move contants to/form primary memory and secondary memory.
79
BIOS
basic input/output system
80
WORM Storage
write once read many (CDs, DVDs, Tapes)
81
Trusted platform module
module that adds further security to a system. typically connected straight to Mobo
82
DEP
Data Execution Prevention - attempts to prevent code execution in memory locaations that are not predefined to have executable content.
83
ASLR
Address space location randomization randomizes the location of instruction sets between different machines. This makes it more difficult to execute attacks.
84
Monolithic Kernel
Compilied into one static executable and the entire kernel runs in supervisor mode. runs in ring 0
85
Microkernels
these are modular. Kernel functions are split up into modules. Modules often operate in ring 3.
86
Reference monitor
mediates access between all subjects and objects.
87
Linux and Unix file permissions
R -read W - write X - execute
88
Linux permisson levels
owner group world
89
Microsoft PErmissions
``` Read Write Read and Execute Modify Full Control ```
90
priveleged programs
UNIX and linux only. Program that has root access to a very specific set of file.s Example - a user doesn't have access to the password file. The password program does though. So a user can change their own password with the passwd program.
91
Virtualization sec. issues
Multi guest on one host If host is compromised, potentially so are all vms
92
IAAS
infrastructure as a service. i.e. linux server hosting, windows OS hosting. Phone system hosting.
93
PAAS
Platform as a service. Web service hosting.
94
SAAS
software as a service - webmail.
95
Grid computing
computers all over the world working together to process some goal/information.
96
Large scale parallel data system
Not sure how this is different from grid computing
97
Peer to peer
bittorrent, napster,
98
Thin client
PC without CPU or Memory. share centralized compute resources.
99
Diskless workstation.
uses network storage
100
Thin client apps
Use a web browser as a universal client.