Domain_3 Flashcards

1
Q

Secure design principles

A

Principles like least privilege, defense in depth, secure defaults, fail securely, separation of duties, keep it simple, zero trust, privacy by design, trust but verify, shared responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Quantum cryptography

A

Relevant and expanded information versus the official study guide for selecting and determining cryptographic solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptanalytic attacks

A

Brute force, ciphertext only, known plaintext, frequency analysis, chosen ciphertext, implementation attacks, side-channel, fault injection, timing, Man-in-the-Middle (MITM), Pass the hash, Kerberos exploitation, Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Purpose of a security model

A

Provides a way for designers to map abstract statements into a security policy, determines how security will be implemented and what subjects/objects can access the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State machine model

A

Describes a system that is always secure no matter what state it is in based on the computer science definition of a finite state machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information flow model

A

Focuses on the flow of information, includes Biba and Bell-LaPadula models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-interference model

A

Concerned with how higher security level subjects affect lower level subjects, ensures different subjects/objects don’t interfere with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lattice-based model

A

Based on the interaction between objects and subjects, used to define security levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Simple security property

A

Describes rules for read operations (no read up)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Star * security property

A

Describes rules for write operations (no write down)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Invocation property

A

Rules around invocations (calls) to subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bell-LaPadula

A

No read up, no write down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Biba

A

No read down, no write up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Clark-Wilson

A

Access control triple (principal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Brewer and Nash (Chinese Wall)

A

Prevents conflict of interest problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mandatory Access Control (MAC)

A

Enforces policy determined by the system using classification labels, not by object owner

17
Q

Role of security policy

A

To inform and guide the design, development, implementation, testing, and maintenance of a system

18
Q

Trusted Platform Module (TPM)

A

A chip on the motherboard for storage and management of encryption keys, provides OS access to keys

19
Q

Trusted Computing Base (TCB)

A

Combination of hardware, software and controls that enforce the security policy

20
Q

Reference monitor

A

The logical part of the TCB that confirms access rights prior to granting access

21
Q

Security kernel

A

The collection of TCB components that implement the reference monitor functionality

22
Q

Common Criteria

A

Enables objective evaluation to validate that a product or system satisfies security requirements, has replaced TCSEC and ITSEC

23
Q

Covert channel

A

Method to pass information over a path not normally used for communication, outside normal security controls

24
Q

Type I hypervisor

A

Native or bare-metal hypervisor with no host OS

25
Q

Type II hypervisor

A

Hosted hypervisor running on top of a regular host OS

26
Q

Cloud Access Security Broker (CASB)

A

Security policy enforcement solution for cloud environments

27
Q

Multifactor Authentication (MFA)

A

Using multiple factors like something you know, have, and are for authentication

28
Q

Authentication vs Authorization

A

Authentication proves identity, authorization grants permissions based on proven identity

29
Q

Privilege and accountability

A

Least privilege

30
Q

Security flaws and vulnerabilities

A

Buffer overflows, backdoors, time-of-check-to-time-of-use (TOCTTOU) attacks

31
Q

Secure code principles

A

Process isolation, layering, abstraction, data hiding

32
Q

Physical security controls

A

Administrative (policies, procedures), logical (technical controls), physical (fencing, locks, etc.)

33
Q

Site selection factors

A

Visibility, surrounding area, accessibility, natural disaster effects

34
Q

Secure work area design

A

Restricted access areas

35
Q

Physical access control threats

A

Propping doors, masquerading, piggybacking

36
Q

Clean power needs

A

Electronic equipment requires clean, consistent power from sources like UPS systems