Feature-based Risk Flashcards

1
Q

How can adding features to software introduce risk?

A

It can open up a new attack surface, potentially leading to compromise or breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a primary risk associated with location-based services?

A

Collection of data on user location and habits, raising privacy concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some uses for location-based services?

A

Finding local stores/attractions, tracking fleets/employees/deliveries, targeted promotions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does RFID stand for?

A

Radio Frequency Identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are RFID tags often used for?

A

Tracking assets (laptops, phones), inventory, physical access (who was where).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a potential fraud risk with RFID in retail?

A

Swapping tags between items to pay a lower price.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does NFC stand for?

A

Near Field Communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List common applications of NFC.

A

Contactless payments (tap-to-pay), door entry systems, exchanging files between nearby devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What security risks are associated with NFC?

A

Potential for stealing personal data or creating fraudulent transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are embedded systems?

A

Computing processes built into other products (like cars, thermostats), usually performing a specific function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What makes patching embedded systems often difficult?

A

They may not be easily accessible physically or technologically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is the long lifespan of embedded systems a security concern?

A

They may remain in use long after vulnerabilities are discovered, potentially without security designed in initially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What challenge exists in isolating functions within embedded systems like cars?

A

It can be difficult to securely separate critical systems (driving controls) from non-critical ones (radio, Bluetooth) connected via network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What environmental conditions must some embedded systems tolerate?

A

Humidity, high/low temperatures, and other difficult environmental factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is firmware?

A

Low-level software embedded onto read-only memory (ROM) or flash memory on hardware chips.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a supply chain risk related to firmware?

A

Chips could be infected with malicious code or backdoors during the manufacturing process.

17
Q

What technology allows the logic on some chips to be altered after manufacturing?

A

Field-Programmable Gate Arrays (FPGAs).

18
Q

What are PLDs or PLCs?

A

Programmable Logic Devices / Programmable Logic Controllers.

19
Q

What is a concern for programmable logic devices regarding power loss?

A

Ensuring they don’t lose their configuration if power fails.

20
Q

What is a TPM?

A

Trusted Platform Module; a chip often added to a motherboard for security functions.

21
Q

What is a primary function of a TPM?

A

Secure storage of cryptographic keys.

22
Q

What process can utilize a TPM to enhance security during startup?

A

A secure boot process, requiring authentication before the main operating system loads.

23
Q

What fundamental problem led to vulnerabilities like Spectre and Meltdown?

A

Lack of proper isolation between different processes running on the same processor chip.

24
Q

How can vulnerabilities like Spectre/Meltdown bypass software controls?

A

They operate at the hardware level, potentially allowing access to memory regions or permissions intended for other processes.

25
What is required to mitigate hardware vulnerabilities like Spectre?
Firmware and software updates to re-establish or improve process isolation and fix configuration issues.
26
What is the purpose of the Common Criteria?
To provide internationally recognized standards (ISO 15408) for evaluating and testing the security of IT products.
27
In Common Criteria terms, what is the "Target of Evaluation" (TOE)?
The specific product or system that is being tested.
28
What does a "Protection Profile" (PP) define in Common Criteria?
A description of the type of security or protection a category of product provides.
29
What does the "Security Target" (ST) specify?
The specific security goals or aims of the particular product being evaluated.
30
What does "Evaluation Assurance Level" (EAL) represent?
The level of rigor and depth of the testing performed, indicating the level of trust in the evaluation results.
31
What components beyond application software need vulnerability assessment and mitigation?
Operating systems, firmware, database management systems, embedded systems, and other supporting infrastructure.