SAE Flashcards

(147 cards)

1
Q

the managerial approval to operate a system based upon knowledge of risk to operate

A

Accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A manually actuated device installed at a fixed location to transmit an alarm signal in response to an alarm condition.

A

Alarm Station

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A device that signals a change of protection zone status in a security system.

A

Annunciator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

high level design or model with a goal of consistency, integrity, and balance

A

Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security policy model with simple security property and *-property. The simple security property is no process may read data at a higher level. This is also known as no read up (NRU). The *-property: no process may write data to a lower level. This is also known as no write down (NWD).

A

Bell-LaPadula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security policy model that deals with integrity alone and ignores confidentiality. First rule integrity - preventing unauthorized users from making modifications. Simple integrity - No read down. Star integrity - No write up. Service commands - Tranquility.

A

Biba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

prolonged loss of commercial power

A

Blackout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

vehicle stopping object

A

Bollard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The part of a lock which, when actuated, is projected (or “thrown”) from the lock into a retaining member, such as a strike plate, to prevent a door or window from moving or opening.

A

Bolt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a process consist of limits set on the memory addresses and resources it can access.

A

Bounds
The bounds state the area within which a process is confined or contained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Created Chinese-Wall model to handle conflicts of interest. Law firm 1 works for Company A. Law firm 2 works for Company B. Law firm 1 and Law firm2 merges. Ensures paralegals on Law firm 1 only works on Company A and paralegals on Law firm 2 only works on Company B.

A

Brewer-Nash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

reduction of voltage by the utility company for a prolonged period of time

A

Brownout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hitting a filed down key in a lock with a hammer to open without real key

A

Bumping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The property of two or more objects, which enables them to store electrical energy in an electric field between them. The basic measurement unit is the Farad.

A

Capacitance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of access control system that uses a card with a coded area or strip, on or inside the card, to actuate a lock or other access control device.

A

Card Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A card usually plastic, that contains encoded information to open a locking device.

A

Card Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the core of a computer that calculates

A

Central Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An organization or business established for the purpose of monitoring subscribers’ alarm systems from a centralized monitoring location rather than at the individual sites.

A

Central Station

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the technical and risk assessment of a system within the context of the operating environment

A

Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

complex instructions. Many operations per instruction. Less number of fetches

A

CICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Integrity security model. Three integrity goals: Preventing unauthorized users from making modifications, Preventing authorized users from making improper modifications, maintaining internal and external consistency. Defines well formed transactions, Separation of duties, Access Triple - subject-application-object.

A

Clark and Wilson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Official information that has been identified and marked as Top Secret, Secret, or Confidential in the interests of national security.~

A

Classified Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A television system, hard-wired, used for proprietary purposes and not for public or general broadcast.

A

Closed Circuit Television

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A keyless lock which requires the turning of a numbered dial to a preset sequence of numbers for the lock to open.

A

Combination Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
the current internationally accepted set of standards and processes for information security products evaluation and assurance, which joins function and assurance requirements
Common Criteria
26
to restrict the actions of a program. Simply put, process confinement allows a process to read from and write to only certain memory locations and resources. This is also known as sandboxing.
Confinement
27
one entity with two competing allegiances
Conflict of interest
28
an unintended communication path
Covert Channel
29
dedicated fast memory located on the same board as the CPU
CPU Cache
30
An individual who is designated the responsibility for maintaining, safeguarding and accounting for classified information.
Custodian
31
a system-level memory protection feature that is built into the OS, it prevents code from being run from data pages such as the default heap, stacks, and memory pools.
Data Execution Prevention
32
a software design technique for abstraction of a process
Data hiding
33
technique allow analysts to comb through data warehouses and look for potential correlated information.
Data Mining
34
large databases, store large amounts of information from a variety of databases for use with specialized analysis techniques.
Data Warehousing
35
A lock that uses strong metal components that cannot be easily forced.
Deadbolt Lock
36
A power or transmission line with a single function, such as data transmission, or to a single source such as an outlet for a computer.
Dedicated Line
37
Any physical or psychological device or method that discourages action.
Deterrent
38
The change in the frequency of a light wave or sound wave, resulting from relative motion of the source and the receiver.
Doppler Effect
39
high frequency noise
Electromagnetic Interference (EMI)
40
A door lock that uses an electrically actuated magnetic attraction to secure the door. Magnetic locks use no moving parts.
Electromagnetic Lock
41
power surge
Electrostatic Discharge
42
hardware or software that is part of a larger system
Embedded
43
momentary loss of power
Fault
44
Alerts personnel to the presence of a fire
Fire Detection
45
Reduces causes of fire
Fire Prevention
46
to reduce fire
Fire Suppression
47
reprogrammable basic startup instructions
Firmware
48
An electrically conductive ribbon used for a sensing circuit.
Foil
49
third party processes used to organize the implementation of an architecture
Framework
50
fault tolerance for power
Generator
51
Not model implementation, not answer
Gong
52
focused on relationship between subjects and objects. Need update, delete, modify. Integrity security model.
Graham Denning
53
More granular than Graham Denning. Access control with list and matrix. Integrity security model.
Harrison-Russo-Ullman
54
mediation of covert channels must be addressed
Information Flow model
55
A passive, low power, area protection device that detects a change in ambient temperature within the coverage pattern caused by the movement of a body.
Infrared Motion Detector
56
specific format of technical and physical controls that support the chosen framework and the architecture
Infrastructure
57
initial surge of current
Inrush Current
58
natural occurrence in circuits that are in close proximity
Interference (noise)
59
An alarm system comprised of intrusion sensors and alarm annunciation devices for the purpose of detecting intruders.
Intrusion Detection Systems
60
focused on the standardization and certification of an organization’s information security management system (ISMS), security governance, a standard; ISMS. Info security minimum systems
ISO 27001
61
inspired from ISO 17799; a guideline which lists security control objectives and recommends a range of specific security controls; more granular than 27001. 14 areas
ISO 27002
62
the past internationally accepted set of standards and processes for information security products evaluation and assurance, which separates function and assurance requirements
ITSEC
63
Not model implementation, not answer
Jeuneman
64
Not model implementation, not answer
Karger
65
the core logic engine of an operating system which almost never changes
Kernel
66
a one way, directed graph which indicates confidentiality or integrity flow
Lattice
67
a programming design concept which abstracts one set of functions from another in a serialized fashion
Layering
68
Not model implementation, not answer
Lee & Shockley
69
Confidentiality and Integrity - use for VAX VMS and Windows
Lipner
70
Subjects are labelled as to their level of clearance. Objects are labelled as to their level of classification or sensitivity.
MAC
71
a physical enclosure for verifying identity before entry to a facility SYN- double door system
Mantrap
72
cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Masked/Interruptible
73
When using memory resources, the processor must have some means of referring to various locations in memory. The solution to this problem is known as addressing
Memory Addressing
74
a program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Memory management
75
An active intrusion sensor that detects the movement of a person or object through a pattern of microwave energy.
Microwave Sensor
76
All of the code working in kernel mode/system mode in an ad hoc and non-modularized OS
Monolithic Operating System Architecture
77
execute different parts of a program simultaneously
Multi Threading
78
more than one CPU on a single board
Multi-Core
79
to execute more than one instruction at an instant in time
Multi-processing
80
more than one processor sharing same memory, also know as parallel systems
Multi-processor
81
rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Multi-programming
82
can offer several security levels without risk of compromising the system’s integrity.
Multi-state machine
83
more than one process in the middle of executing at a time
Multi-tasking
84
more than one CPU is involved.
Multiprocessing
85
execute more than one task at the same time
Multitasking
86
subjects will not interact with each other's objects
Non-interference
87
state of computer, to be running a process
Operating
88
divides memory address space into even size blocks called pages. To emulate that we have more RAM than we have. SYSTEM KERNAL KNOWS THE LOCATION OF THE PAGE FILE
Paging
89
A kind of motion detector that uses a focused beam of light to detect an intruder.
Photoelectric Alarm
90
using small special tools all tumblers of the lock are aligned for opening a door
Picking
91
a type of multitasking that allows for more even distribution of computing time among competing request
Preemptive
92
memory - RAM
Primary storage
93
a form of data hiding which protects running threads of execution from using each other's memory
Process isolation
94
memory management technique that allows two processes to run concurrently without interaction
Protection
95
Numerical values, Divides physical memory up into particular sized blocks, each of which has an associated numerical value called a protection key
Protection Keying
96
two or more processes require access to the same resource and must complete their tasks in the proper order for normal functions
Race Condition
97
lower frequency noise
Radio Frequency Interference (RFI)
98
Red = trusted network, Orange = TCSEC evaluation Brown = trusted facilities management dcsmmmTan = audit, Aqua = glossary. Green = password management
Rainbow series
99
the hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Reference Monitor
100
memory management technique which allows data to be moved from one memory address to another
Relocation
101
implementation of operating system protection mechanism, where more sensitive built upon the layering concept
Ring protection
102
reduced instructions. Simpler operations per instruction. More fetches.
RISC
103
a process state, to be executing a process on the CPU
Running
104
is a derivative of PaaS. Provides on-demand online access to specific software applications or suites without the need for local installation. In many cases, there are few local hardware and OS limitations.
SaaS
105
is an enterprise security architecture framework that is similar to the Zachman framework. It uses the six communication questions (What, Where, When, Why, Who, and How) that intersect with six layers (operational, component, physical, logical, conceptual, and contextual).
Sherwood Applied Business Security Architecture (SABSA)
106
short period of low voltage.
Sag/Dip
107
the hard drive
Secondary storage
108
a template for the designing the architecture
Security Blueprint
109
an administrative unit or a group of objects and subjects controlled by one reference monitor
Security domain
110
subset of operating systems components dedicated to protection mechanisms
Security kernel
111
dividing a computer’s memory into segments.
Segmentation
112
memory management technique which allows subjects to use the same resource
Sharing
113
operates in the security environment at the highest level of classification of the information within the computer. In other words, all users on that system must have clearance to access the info on that system.
Single state machine
114
the applications and systems at a specific, self-contained location are evaluated.
Site accreditation
115
used by processors to communicate instructions and data to each other
Stack Memory Segment
116
abstract and mathematical in nature, defining all possible states, transitions and operations
State machine model
117
a process state, to be either be unable to run waiting for an external event or terminated
Stopped
118
(monitor, system, privileged) a state for operating system tasks only
Supervisor mode
119
sudden rise in voltage in the power supply.
Surge
120
to reduce sudden rises in current
Surge Suppressor
121
The unauthorized entry into a facility or security container in a manner in which evidence of such entry is not discernable under normal circumstances.
Surreptitious Entry
122
high degree of visual control
Surveillance
123
Not model implementation, not answer
Sutherland
124
a major application or general support system is evaluated.
System accreditation
125
the past U.S. military accepted set of standards and processes for computer systems evaluation and assurance, which combines function and assurance requirements
TCSEC (Orange Book)
126
people protect their domain
Territoriality
127
a unit of execution
Threads
128
the past U.S. military accepted set of standards and processes for network evaluation and assurance, which combines function and assurance requirements
TNI (Red Book)
129
race condition exploits, and communication disconnects are known as state attacks because they attack timing, data flow control, and transition between one system state to another.
TOCTTOU attack
130
Anti-personnel device, usually of barbed or concertina wire, installed at the tops of fences and along roof edges.
Top Guard
131
line noise that is superimposed on the supply circuit.
Transients
132
all of the protection mechanism in a computer system
Trusted Computing Base
133
an application or system that is distributed to a number of different locations is evaluated.
Type accreditation
134
A device that senses motion in a protected area by a Doppler shift in the transmitted ultrasonic energy.
Ultrasonic Detector
135
to smooth out reductions or increases in power
UPS, Uninterruptible Power Source
136
(problem or program state) the problems solving state, the opposite of supervisor mode
User mode
137
memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Virtual Memory
138
software-defined shared storage system is a virtual re-creation of a SAN on top of a virtualized network or an SDN.
Virtual SAN
139
a process state, (blocked) needing input before continuing
Wait
140
Zachman framework
Enterprise Architecture Framework A two-dimensional model that intersects communication interrogatives (What, Why, Where, and so on) with various viewpoints (Planner, Owner, Designer, and so on). It is designed to help optimize communication between the various viewpoints during the creation of the security architecture.
141
Large protected premises are divided into areas or zones, each having it own identification and/or annunciation.
Zone
142
IPv6 features
Mobile Quality of Service Jumbograms Next Header IPsec as next header
143
IPv6 Control Limit unsanctioned paths
Threat Vulnerable to eavesdropping and injection attacks -> v6 globally unique addresses -> If VPN dropped, possible communication
144
IPv6 Control Limit addresses to a small range of a subnet and controlling assignment rate
NDP DoS attacks when a router is overwhelmed by address resolution requests
145
IPv6 Control Router advisement guard
Eavesdropping via spoofed router advertisements
146
IPv6 Control DHCPv6 - Shield filtering rules
Unauthorized ports and malicious packets for DHCP services
147
IPv6 Control PEPs configured to enforce recommended header order
Malformed packets: do not conform to the recommended header extension order or maximum number of extension header repetitions