Domain 3 - Security Engineering Flashcards

(72 cards)

1
Q

DES

A

Data Encryption Standard

  • 64 bit blocks of text
  • 64 bit key, 8 bits for parity
    • EFFECTIVE KEY LENGTH is 56 bits
    • TOTAL KEY LENGTH is 64 bits
  • Since DES uses BLOCK size of 64, result is still 64 bits of encrypted data even though effective key size is 56 bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DES - EFFECTIVE key length

A

56 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES - TOTAL key length

A

64 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard

  • Sequences of 128-bit blocks
  • Cipher key can be 128, 192, 256 bits
  • AES-128, AES-192, AES-256
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bell-LaPadula

A

MANDATORY ACCESS CONTROL

  • CONFIDENTIALITY
  • Simple Security Property (NRU)
    • Security Property (NWD)
  • Strong Tranquility Property
  • Weak Tranquility Property
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bell-LaPadula - Simple Security Property

A

No Read Up (NRU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bell-LaPadula - * Security Property

A

No Write Down (NWD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bell-LaPadula - Strong Tranquility Property

A

The security label will not change when the system is operating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bell-LaPadula - Weak Tranquility Property

A

The security label will not change in a way that conflicts with defined security properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Biba

A

INTEGRITY

  • Simple Integrity Axiom
    • Integrity Axiom
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Biba - Simple Integrity Axiom

A

No Read Down (NRD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Biba - * Integrity Axiom

A

No Write Up (NWU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Clark-Wilson

A

INTEGRITY

  • Separation of Duties (SoD)
  • Well-formed transactions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Clark-Wilson - “Access Control Triple”

A

TP - Transaction Procedure (well formed transaction)
CDI - Constrained Data Item (data that requires integrity)
UDI - Unconstrained Data Item (data that does not require integrity)
IVP - Integrity Verification Procedures (ensures data is kept in a valid state)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Clark Wilson - Transaction Procedure

A

Well-formed transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Clark Wilson - Constrained Data Item

A

Data that requires integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Clark Wilson - Unconstrained Data Item

A

Data that does not require integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Clark Wilson - Integrity Verification Procedures

A

Ensures that data is kept in a valid state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Information Flow Model

A

Uses a lattice
Objects are labeled with security CLASSES
Information can flow either upward or at the same level
Both Bell-LaPadula AND Biba use the Information Flow Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Reading Down and Writing Up

A

Applies to Bell-LaPadula

NRU/NWD are the opposite of this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

State Machine Model

A

Mathematical model that groups all possible system occurrences
Occurrences are called STATES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Chinese Wall Model

A

Designed to avoid CONFLICTS OF INTEREST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Chinese Wall Model - CoI’s

A

CoI’s = Conflict of Interest categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Noninterference

A

Ensures data in different security domains remains separate from one another
Prevents covert channels
Each data access attempt is independent from others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Take-Grant
Contains rules that govern the interactions between subjects and objects, including permissions subjects can grant to other subjects
26
Take-Grant - Four Rules
Take, Grant, Create, Remove
27
TCSEC
Trusted Computer System Evaluation Criteria (TCSEC) NIST and NCSC (National Computer Security Center) AKA Orange Book DOES NOT address networks. Systems only
28
TCSEC/Orange Book - Divisions
D: Minimal Protection C: Discretionary Protection (C1, C2) B: Mandatory Protection (B1, B2, B3) A: Verified Protection (A1)
29
TNI/Red Book
Trusted Network Interpretation | Brings TCSEC concepts to network systems
30
ITSEC
European Information Technology Security Evaluation Criteria (ITSEC) European version of the Orange Book
31
Information Common Criteria
Successor to ITSEC "Target of Evaluation" and "Security Target" PRIMARY OBJECTIVE: Eliminate known vulnerabilities of the target for testing
32
Layering
Separates hardware and software functionality into modular tiers One layer is not directly affected by a change to another
33
Abstraction
Hides unnecessary details from the user | Makes processes LESS COMPLEX to ENHANCE security
34
Security Domains
A list of objects that a subject is allowed to access DOD - Confidential, Secret, Top Secret Kernels - User mode, Kernel mode
35
The Ring Model
Separates and protects domains (ex: kernel/user mode) from each other
36
The Ring Model - Ring 0
Kernel - MOST trusted
37
The Ring Model - Ring 1
Other OS components
38
The Ring Model - Ring 2
Device Drivers
39
The Ring Model - Ring 3
User - LEAST trusted
40
The Ring Model - Ring -1
Hypervisor Mode
41
DEP
Data Execution Prevention - Can be enabled within hardware and/or software - Attempts to ensure that memory locations not PRE-DEFINED to contain executable content will not have the ability to have code executed - Protects against STACK/HEAP-based buffer overflows
42
ASLR
Address Space Layout Randomization | - Makes memory addresses employed by the system less predictable
43
CPU - Multitasking
Allows multiple tasks to run simultaneously on one CPU | Most modern OS's support multitasking
44
CPU - Multiprocessing
Runs multiple processes on multiple CPIs
45
CPU - Multiprocessing - SMP
Symmetric Multiprocessing | - One operating system to manage all CPUs
46
CPU - Multiprocessing - AMP
Asymmetric Multiprocessing | - One OS system image per CPU, acting as independent systems
47
Swapping vs Paging
``` Swapping = copying ENTIRE process to or from disk Paging = copying BLOCKS of memory to or from disk ```
48
WORM (memory)
Write Once Read Many
49
Infrastructure as a Service (IaaS)
Provides an entire virtualized OS | Customer configures from the OS on up
50
Platform as a Service (PaaS)
Provides a pre-configured OS | Customer configures applications, then just uses the applications
51
Software as a Service (SaaS)
Completely configured solution from the OS to the applications think: O365, Dropbox, etc...
52
Covert Storage Channel
Uses shared storage, such as a temporary directory, to allow two subjects to signal eachother
53
Covert Timing Channel
Relies on the system clock to infer sensitive information
54
Overt Channel
Opposite of a covert channel. | Authorized communication that complies with security policy
55
Macro Virus
Written in a macro language
56
Boot Sector Virus
Infects the boot sector of a PC | Ensures that the virus loads upon system startup
57
Stealth Virus
hides itself from the OS and AV
58
Polymorphic Virus
Changes its signature upon infection of a new system | Attempts to evade AV
59
Multiparte Virus
Spreads via multiple vectors
60
Server-side Attack
Launched directly from the attacker to a listening service
61
Client-side Attack
User downloads malicious content | Firewalls often fail to prevent these attacks
62
Client-side Attack Mitigations
Patching applications | User Awareness
63
Server-Side Attack Mitigations
Firewalls Patching System hardening Defense in depth
64
Inference
There is a mystery to be solved Lower level details provide CLUES to DEDUCE higher level information POLYINSTANTIATION can help defend against inference
65
Aggregation
Mathematical process User asks every questions and receives every answer, then can derive restricted information NO DEDUCTION IS REQUIRED (answer is given)
66
Cryptology
The science of secure communication | Encompasses BOTH cryptography and cryptanalysis
67
Cryptography
Creates messages whose meaning is hidden
68
Cryptanalysis
The science of breaking encrypted messages
69
Diffusion (encryption)
The order of the plaintext should be "diffused" in the ciphertext
70
Confusion (encryption)
The relationship between the plain/ciphertext should be as confused (random) as possible
71
Substitution (encryption)
Replaces one character for another | Provides CONFUSION
72
Permutation (encryption)
Also called transposition | Provides diffusion by rearranging the characters of the plaintext, anagram style