Domain 3, Security architectures, designs, solution elements Flashcards

1
Q

Modes of Operation (security)

A

Way of an operating system to work at certiain levels of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dedicated Mode

A

System contains objects of only one classification label. All subs must have clearance at least as high as the object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System High mode

A

contains mixed object levels. All subs must have clearance equal to the highest object classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compartmented mode

A

Ass subs have necessary clearance, but also are required to get formal access approval. Need to know. Compartmented information better allows for need to know access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multilevel mode

A

Contains mixed object classes. The Reference Monitor controlls access between subjects and objects. Ensures subjects can only access info at their level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Orange book

A

TCSEC, first security standard. Most concepts still in use today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCSEC

A

Trusted Comp System Evaluation Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Orange Book - Divisions

A

D- lowest
C
B
A - highest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Classes

A

i.e. C1, C2, A1, A2. Higher is more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TNI/Red book

A

Trusted Network INterpretation. Uses orange book concepts to apply to networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ITSEC

A

Information tech security evaluation criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ITSEC

A

first successful internation eval model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ITSEC Assurance ratings

A

E0 - E6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ITSEC Functionality rating

A

F-C1, F-c2, F-b1, F-b2, F-b3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

International Common Criterai

A

replaces ITSEC and TCSEC. Designed to evaluate commercial and govt systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Common Criteria ToE

A

Target of evaluation. System or product being evaluated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Common Criteria ST

A

Security Target. Documentation that describes the ToE, including sec requirements and operational env.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Protective Profile

A

unique set of sec. reqs for a specific category of products (i.e. firewall, end user pc, intrusion detect.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Eval Assurance Levvel

A

EAL = score of the tested product or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

EAL Levels

A

EAL1 through EAL7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

EAL1

A

Functionally tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

EAL2

A

Structurally tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

EAL3

A

Methodically tested and checked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

EAL4

A

methodically designed, tested, and and checked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

EAL5

A

semi formally designed and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

EAL6

A

semi formally verified, designed, and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

EAL7

A

Formally verified, designed, and tested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Layering

A

separates hardware and software functionality into tiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Example sec. architecture layers

A
  1. Hardware
  2. Kernel and drivers
  3. OS
  4. Apps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Abstraction

A

Hides unnecessary details from the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Sec. domains

A

list of objects a subject is allowed to access. Erros between domains don’t affect each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Kernel Mode

A

sec. domain. where the kernel lives. allows low level access to memory, cpu, disk, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

User mode

A

sec. domain where users live.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Ring model

A

CPU Hardware layering that separates and protects domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Rings in the ring model

A

0 - kernel
1 - OS components not fitting in ring 0
2 - Device drivers
3 - User apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

System Call

A

Method for a process to communicate between rings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Hypervisor ring

A

HV lives in ring 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Open and closed systems

A

Open - windows, linux

Closed - MAC-OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Sec Hardware Architecture

A

Focuses on applying CIA to physical components of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

System Unit

A

Computer case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Motherboard

A

holds cpu, memory, firmware (bios), and connects to peripherals.

42
Q

Computer Bus

A

primary comms channel on a computer system.

43
Q

Northbridge

A

in system with two busses,

AKA MCH Memory control unit

connects CPU, RAM, and video cards.

44
Q

Southbridge

A

ICH - input/output controller hub

45
Q

southbridge

A

Connects to input output peripherals

46
Q

CPU

A
  • doi
47
Q

ALU

A

subsystem of CPU. performas math processes. fed instructions by the Control unit

48
Q

CU

A

subsystem of CPU. Acts as traffic cop for running processes.

49
Q

Process steps

A
  1. fetch inst.
  2. decode inst.
  3. execute instruction
  4. write result
50
Q

Fetch and Execute

A

CPU runs only one process at a time. Takes full clock cycle for one process.

51
Q

pipelining.

A

way for CPU to work through multiple instructions at once.

i.e. at the same time:

  1. Fetching instruction 4
  2. decoding instruction 3
  3. executing instruction 2
  4. writing instruction 1.
52
Q

interrupts

A

Asynchronus event - causes CPU to stop what it’s doing, do another process, then resume the task it was previously in the middle of.

53
Q

Process

A

Executable program and its’ associated data loaded and running in memory.

54
Q

HWP

A

Heavy weight process AKA task.

55
Q

Thread

A

a child process started from another ‘parent’ process. LWP.

56
Q

LWP

A

light weight process - thread

57
Q

Threads can ______ Memory

A

share.

58
Q

Process states

A

New, ready, running, blocked, terminate

59
Q

Process State - New

A

process is being created

60
Q

Process State - Ready

A

process waiting execution by cpu

61
Q

Process State - running

A

process is being executed

62
Q

Process State - blocked

A

waiting for I/O

63
Q

Process State - terminate

A

Process is completed

64
Q

Multitasking

A

Allows cpu to run multiple tasks at once.

65
Q

Multiprocessing

A

Runs multiple processes on multiple CPUs

66
Q

SMP

A

Symmetric Multiprocessing - uses one OS for all CPUs

67
Q

AMP

A

asymmetric multiprocessing. Uses one OS per CPU

68
Q

CISC

A

Complex instruc. set computer

uses large set of complex machine language instructions

69
Q

RISC

A

Reduced instruct. set computer

uses reduced set of simpler machine language instructions.

70
Q

Direct Memory addressing

A

Address is based off of physical memory location.

71
Q

Indirect memory addressing

A

address based off of memory reference

72
Q

register direct addressing

A

register directly references memory location

73
Q

register indirect addressing

A

register references another register memory location

74
Q

Memory protection

A

Prevents one process from affecting the CIA of another process. Requirement for secure multi-user systems.

75
Q

Process isolation

A

logical control that prevents a process from interfering with another process

76
Q

Hardware segmentation

A

Further isolates processes by assigning them physically separate memory locations.

77
Q

Virtual memory

A

provides virtual mapping between apps and system memory.

78
Q

Swapping

A

uses virtual memory to move contants to/form primary memory and secondary memory.

79
Q

BIOS

A

basic input/output system

80
Q

WORM Storage

A

write once read many (CDs, DVDs, Tapes)

81
Q

Trusted platform module

A

module that adds further security to a system. typically connected straight to Mobo

82
Q

DEP

A

Data Execution Prevention - attempts to prevent code execution in memory locaations that are not predefined to have executable content.

83
Q

ASLR

A

Address space location randomization

randomizes the location of instruction sets between different machines. This makes it more difficult to execute attacks.

84
Q

Monolithic Kernel

A

Compilied into one static executable and the entire kernel runs in supervisor mode. runs in ring 0

85
Q

Microkernels

A

these are modular. Kernel functions are split up into modules. Modules often operate in ring 3.

86
Q

Reference monitor

A

mediates access between all subjects and objects.

87
Q

Linux and Unix file permissions

A

R -read
W - write
X - execute

88
Q

Linux permisson levels

A

owner
group
world

89
Q

Microsoft PErmissions

A
Read
Write
Read and Execute
Modify
Full Control
90
Q

priveleged programs

A

UNIX and linux only. Program that has root access to a very specific set of file.s

Example - a user doesn’t have access to the password file.

The password program does though. So a user can change their own password with the passwd program.

91
Q

Virtualization sec. issues

A

Multi guest on one host

If host is compromised, potentially so are all vms

92
Q

IAAS

A

infrastructure as a service. i.e. linux server hosting, windows OS hosting. Phone system hosting.

93
Q

PAAS

A

Platform as a service. Web service hosting.

94
Q

SAAS

A

software as a service - webmail.

95
Q

Grid computing

A

computers all over the world working together to process some goal/information.

96
Q

Large scale parallel data system

A

Not sure how this is different from grid computing

97
Q

Peer to peer

A

bittorrent, napster,

98
Q

Thin client

A

PC without CPU or Memory. share centralized compute resources.

99
Q

Diskless workstation.

A

uses network storage

100
Q

Thin client apps

A

Use a web browser as a universal client.