Domain 3: System Design Flashcards

1
Q
  • Uses multiple security controls in a series

- i.e. pass one security control you enter into another

A

Layering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Generic list of security architecture layers

A
  1. Hardware
  2. Kernel and device drivers
  3. OS
  4. Applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hides unnecessary details from the user.

A

Abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List of objects a subject is allowed to access.

A

Security Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • CPU hardware layering model that separates and protects domains from each other
  • i.e. kernel mode and user mode
A

Ring Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Allow processes to communicate with the kernel and provide a window between the rings

A

System Calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the rings in the Ring Model

A

Ring 0: Kernel
Ring 1: Other OS components that do not fit in Ring 0
Ring 2: Device drivers
Ring 3: User applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uses open hardware and standards, using standard components from a variety of vendors

A

Open System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Uses proprietary hardware or software

A

Closed System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Another name for a computer case

A

System Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Communication between the CPU, memory, and input/output devices (i.e. keyboard, mouse, and etc.) occurs here

A

Computer Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is the part of the CPU that performs math calculations

A

Arithmetic Logic Unit (ALU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Four steps of a CPU “fetch and execute (FDX)” process

A
  1. Fetch instructions
  2. Decode instruction
  3. Execute instruction
  4. Write (save) Result
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Combines multiple CPU steps into one process

A

Pipelining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Causes the CPU to stop processing its current task, save the state and begin processing a new request.

A

Interrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An executable program and its associated data loaded and running in memory

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Parent process that spawns additional child processes

A

Threads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Allows multiple tasks to run simultaneously on one CPU

A

Multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Runs multiple processes on multiple CPUs

A

Multiprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CPU design that uses a large set of complex machine language instructions

A

Complex Instruction Set Computer (CISC)

21
Q

CPU design that uses reduced set of simpler instructions

A

Reduced Interaction Set Computer (RISC)

22
Q

Memory logical control that prevents one process from interfacing with another

A

Process Isolation

23
Q

Uses virtual memory to copy contents of RAM to and from disk

24
Q

Storage that can be written to once and read many times.

A

WORM Storage

25
Hardware chip that provides random number generation for cryptographic operations
Trusted Platform Module
26
Prevents code execution in memory locations that are not pre-defined to contain executable content
Data Execution Prevention (DEP)
27
Randomizes memory addresses make exploitation difficult
Address Space Location Randomization (ASLR)
28
Provides interface between hardware and rest of the OS
Kernel
29
- Enforces system’s security policy - Logical part of the TCB - i.e. preventing a normal user from writing to a restricted file like the system password file
Reference Monitor
30
Called bare metal, virtualization OS runs directly on server
Type 1 Hypervisor
31
Virtualization application runs on a normal OS i.e. Windows 10
Type 2 Hypervisor
32
- Customer configures OS, apps, and performs all required maintenance - Cloud service provider maintains the cloud infrastructure - i.e. servers, storage, some cases network resources
Infrastructure As A Service (IaaS)
33
- Customer manages their apps - Cloud service provider is responsible for the maintenance of host OS and the underlying infrastructure - i.e. hardware, OS, applications
Platform As A Service (PaaS)
34
- Completely configured, from the OS to apps - Customer does not manage or control any assets - i.e. Gmail
Software as a Service (SaaS)
35
- Cloud that houses data for a single organization | - Can be operated by a third party or in-house
Private Clouds
36
Attempts to harness the computational resources of a large number of dissimilar devices
Grid Computing
37
Allows for increased performance through economies of scale
Large-Scale Parallel Systems
38
- Any system can act as client, server or both, depending on data needs - No central servers in this model.
Peer-to-Per (P2P)
39
Allows centralization of applications and their data, as well as the associated security costs of upgrades, patching, data storage, etc.
Thin Clients
40
Form of computer management device that controls industrial processes and machines
Industrial Control Systems (ICS)
41
Typically found in industrial process plants where the need to gather data and implement control over a large-scale environment from a single location is essential.
DCS Units
42
- Typically deployed for management and automation of various industrial operations - i.e. Controlling systems on a assembly line, large digital light display (giant display system in a stadium)
PLC Units
43
Can operate as a stand alone device, be networked together with other like systems, or be networked with traditional IT systems.
SCADA System
44
Divides CPU time among child process (aka threads)
Multithreading
45
Restricts a process to reading from and writing to certain memory locations
Confinement
46
Limits of memory a process cannot exceed when reading or writing
Bounds
47
The mode a process runs in when it is confined through the use of memory bounds
Isolation
48
Collections of TCB components that implement the functionality of the reference monitor
Security Kernel