Domain Three: Architecture and Design Flashcards
What are the four main element of code quality and testing ?
Code Analysis, Stress Testing, Model Verification, Version Control
What are the two types of code analysis ?
Dynamic and Static
What is dynamic code analysis ?
Testing during execution by feeding inputs into the application
Fuzzing is a method of dynamic analysis in which a brute force test method is used to detect input and validation issues or vulnerabilities in the system
What is static code analysis ?
Involves examining the code without execution
What is model verification ?
Making sure that the systems does what it is intended to do in an expected manner. Do interdependencies with other functions and apps also behave as expected.
What is stress testing ?
Testing the app for performance bottlenecks under normal conditions. Load testing is the testing under peak conditions over and above stress testing.
What are embedded systems ?
Embedded systems are those that are incorporated into other systems examples are Smart TVs and Washing Machines.
Describe IOT/Smart Devices ?
These are characterised by remote control of the system at hand. You can think of home automation and fitness sensors as being prime examples of this.
During the course of the history of IOT functionality over security was very much the design pattern and it now should be considering that they have access to our biometric data.
What is the problem in terms of security with printers and MFD devices ?
Printers and MFDs are hackable. Printers communicate to servers and computers in a bidirectional manner taking jobs, queuing them and then sending back outcome notifications.
It is perfectly feasible that these devices can send malware back to the server especially as all to often they have been designed for functionality first and security was an afterthought.
What are real time operating systems ?
Characterised by not queuing data and events but operating on them as soon as they arrive. Think of a robot arm in a car assembly plant. The biggest security risk is something interrupting the timing and this often means that they are difficult to take offline to patch and update which in turn increases the security risk.
What are SCADA systems ?
Supervisory Control and Data Acquisition - These systems usually are part of another system that has a physical aspect to them an example being traffic lights.
Traditionally these systems were separated and air gapped so that the only access to them was via external media but they are increasingly becoming connected which has meant a greater security attack surface.
What are the issues of Aircraft and security ?
Physical buttons, switches, gauges etc are replaced with digital devices such as touch screens.
What are the issues of security with Medical devices ?
Often overlooked but these are critical and have to be re-certified everytime they are updated.
What are the issues with unmanned vehicles ?
Popular with military controlled over network connection which makes it an attractive target for hacking.
What are the security issues we should be aware of with vehicles ?
Vehicles are coming with more and more hackable technology.
What is system on a chip ?
These are systems where the software and hardware instructions are all governed from a single chip. Computers are multi chip systems.
What are the uses of benchmarks ?
These are usually guides on the best practice for configuring systems and components.
CIS (Centre for Internet Security)
What are the three ways of implementing defence in depth ?
There are three ways to implement
Vendor Diversity - For example having both windows and linux devices
Control Diversity - Administration controls such as policies and risk assessments and technical controls such as firewalls and IDS/IPS
User Training - Policy and procedure awareness.
Give an example of a non regulatory framework ?
NIST
Give some examples of Physical security controls ?
Lighting - Important to give visibility of action
Signs - Demarcates dangerous or high security areas
Alarms - Warnings
Barricades - Protection of areas
Fencing - Physical around area Cage - Indoor fencing Gate - monitoring on entrance to cage
Bollard - Simple Barricade
Mantraps - Effective against tailgating
Faraday Cages - Used to stop emi
TEMPEST - DoD program to emi and eavesdropping
CCTV - Should be on separate network so they dont provide an entrance to corporate network
Physical Security Logs - Should be taken
Bump Key Resistant Locks - Bump keys are those where the notches are deeply cut allowing an attacker to force the key into the lock and open it
HVAC - Heating, Ventilation, air con
Hot aisles and cold aisles can be used to maintain a data centre temp
Fire suppression systems - dont prevent fires but limit damage
Describe RAID 0
Striped Disks - Data is spread across multiple disks which increases speed but not redundancy
Describe RAID 1
Mirrored Disks - Data is copied from one disk to another. If the disk is lost we dont lose the data. This is more expensive than other methods.
Describe RAID 5
Block Striped with Error check - Most commonly used stripes data and parity checks across multiple drives; increased reliability and speed
Describe RAID 10
Stripe of Mirrors - combines striping and mirroring