Security Architecture & Design Flashcards

(189 cards)

1
Q

What are the 9 main components of the CPU?

A
Arithmetic Logic Unit (ALU)
Bus Interface Unit (BIU)
Control Unit
Decode Unit
Floating Point Unit (FPU)
Memory Management Unit (MPU)
Pre-fetch Unit
Protection Test Unit (PTU)
Registers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which component of the CPU performs numerical calculations?
Arithmetic Logic Unit (ALU)
Bus Interface Unit (BIU)
Control Unit
Decode Unit
Floating Point Unit (FPU)
Memory Management Unit (MPU)
Pre-fetch Unit
Protection Test Unit (PTU)
Registers
A

Arithmetic Logic Unit (ALU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which component of the CPU supervises data transfers over the bus system between the CPU and I/O devices?
Arithmetic Logic Unit (ALU)
Bus Interface Unit (BIU)
Control Unit
Decode Unit
Floating Point Unit (FPU)
Memory Management Unit (MPU)
Pre-fetch Unit
Protection Test Unit (PTU)
Registers
A

Bus Interface Unit (BIU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which component of the CPU coordinates other CPU components during program execution?
Arithmetic Logic Unit (ALU)
Bus Interface Unit (BIU)
Control Unit
Decode Unit
Floating Point Unit (FPU)
Memory Management Unit (MPU)
Pre-fetch Unit
Protection Test Unit (PTU)
Registers
A

Control Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which component of the CPU converts incoming instructions into individual commands?
Arithmetic Logic Unit (ALU)
Bus Interface Unit (BIU)
Control Unit
Decode Unit
Floating Point Unit (FPU)
Memory Management Unit (MPU)
Pre-fetch Unit
Protection Test Unit (PTU)
Registers
A

Decode Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which component of the CPU handles higher math operations for the ALU and control unit?
Arithmetic Logic Unit (ALU)
Bus Interface Unit (BIU)
Control Unit
Decode Unit
Floating Point Unit (FPU)
Memory Management Unit (MPU)
Pre-fetch Unit
Protection Test Unit (PTU)
Registers
A

Floating Point Unit (FPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which component of the CPU handles addressing and cataloguing data that's stored in memory and translates logical addressing into physical addressing?
Arithmetic Logic Unit (ALU)
Bus Interface Unit (BIU)
Control Unit
Decode Unit
Floating Point Unit (FPU)
Memory Management Unit (MPU)
Pre-fetch Unit
Protection Test Unit (PTU)
Registers
A

Memory Management Unit (MMU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which component of the CPU monitors all CPU functions to ensure they are properly executed?
Arithmetic Logic Unit (ALU)
Bus Interface Unit (BIU)
Control Unit
Decode Unit
Floating Point Unit (FPU)
Memory Management Unit (MPU)
Pre-fetch Unit
Protection Test Unit (PTU)
Registers
A

Protection Test Unit (PTU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which component of the CPU hold CPU data, addresses and instructions temporarily, in special buffers?
Arithmetic Logic Unit (ALU)
Bus Interface Unit (BIU)
Control Unit
Decode Unit
Floating Point Unit (FPU)
Memory Management Unit (MPU)
Pre-fetch Unit
Protection Test Unit (PTU)
Registers
A

Registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which component of the CPU pre-loads instructions into CPU registers?
Arithmetic Logic Unit (ALU)
Bus Interface Unit (BIU)
Control Unit
Decode Unit
Floating Point Unit (FPU)
Memory Management Unit (MPU)
Pre-fetch Unit
Protection Test Unit (PTU)
Registers
A

Pre-fetch Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The basic operation of a microprocessor consists of two distinct phases. What are they?

A

fetch and execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fetch and Execute are otherwise known as what in CPU terms?

A

Basic Machine Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the basic machine cycle controlled by?

A

CPU Clock signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 4 operating states for a computer CPU?

A
  • Operating (or run) state
  • Problem (or application) state
  • Supervisory state
  • Wait state
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

During which CPU state are only a limited subset of non privileged instructions available?

A

Problem (or application) state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When the CPU executes a privileged instruction, meaning that instruction is available to a system admin or authorised user/process only, what state is the CPU in?

A

Supervisory state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two basic types of CPU designs?

A
  • Complex Instruction Set Computing (CISC)

- Reduced Instruction Set Computing (RISC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which CPU design can perform multiple operations per instruction and is optimised for systems in which the fetch phase is the longest part of the instruction execution cycle?

A
  • Complex Instruction Set Computing (CISC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which CPU design uses fewer, simpler instructions, requiring fewer clock cycles to execute and is optimised for systems in which the fetch and execute phases are approximately equal?

A
  • Reduced Instruction Set Computing (RISC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are two ways of describing a microprocessor?

A
  • Scalar

- Superscalar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the difference between scalar and superscalar

A

Scalar executes a single instruction at a time whereas superscalar can execute multiple instructions concurrently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which classification of processor can alternate the execution of multiple subprograms or tasks on a single processor?

  • Multitasking
  • Multiprogramming
  • Multiprocessing
A

Multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which classification of processor alternates the execution of multiple programs on a single processor?

  • Multitasking
  • Multiprogramming
  • Multiprocessing
A

Multiprogramming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which classification of processor executes multiple programs on multiple processors simultaneously?

A

Multiprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is "Multistate" in relation to a processor?
OS supports multiple operating states, ie Normal and Safe mode in Windows.
26
What term is used for an operating system that provides different shell environments, profiles or privilege levels for each user, e.g. "Run As" in Windows?
Multi-User
27
Which piece of hardware groups electronic conductors that interconnect the various components of the computer?
Bus
28
What are the 3 bus structures?
- Data Bus - Address Bus - Control Bus
29
Which bus structure transmits data between the CPU, memory and peripheral devices? - Data Bus - Address Bus - Control Bus
- Data Bus
30
Which bus structure transmits addresses of data and instructions between the CPU and memory?
- Address Bus
31
Which bus structure transmits control information (device status) between the CPU and other devices?
- Control Bus
32
Which part of a computer stores programs, instructions and data?
Memory
33
What are the two main types of physical (real) memory?
Random Access Memory (RAM) | Read Only Memory (ROM)
34
What are the two main types of RAM?
Dynamic RAM | Static RAM
35
Which type of RAM is faster and doesn't need to be refreshed? SRAM or DRAM?
SRAM
36
Firmware typically uses which type of memory? | RAM or ROM?
ROM
37
The term "Main Storage" and "Primary memory" relates to what?
Physical memory (normally RAM)
38
What are the 4 variations of ROM?
- Programmable Read-Only memory (PROM) - Erasable PROM (EPROM) - Electonically EPROM (EEPROM) - Flash Memory
39
Which type of ROM cannot be re-written? - Programmable Read-Only memory (PROM) - Erasable PROM (EPROM) - Electonically EPROM (EEPROM) - Flash Memory
PROM
40
Which type of ROM can be erased by shining UV light on the chip? - Programmable Read-Only memory (PROM) - Erasable PROM (EPROM) - Electonically EPROM (EEPROM) - Flash Memory
- Erasable PROM (EPROM)
41
Dynamic storage on non-volatile magnetic media such as a hard disk is otherwise known as what?
Secondary memory
42
A paging file, swap space or swap partition is typically known as what type of memory?
Virtual memory
43
What are two important security concepts associated with memory?
- the protection domain | - memory addressing
44
Which security concept prevents other programs or processes from accessing or modifying the contents of address space that's already been assigned to another active program or process?
the protection domain
45
What security concept describes the method used by the CPU to access the contents of memory?
- memory addressing
46
What is the difference between memory space and address space?
memory space describes the amount of physical memory in a computer system whereas address space specifies where memory is located in a computer system.
47
What is otherwise known as a hard coded address assigned to physically installed memory and can only be accessed by the OS that maps physical address to virtual addresses?
A physical memory address
48
What is the term used to describe the address that applications use to specify a desired location in memory?
Virtual (or symbolic) memory address
49
What are the 5 common virtual memory addressing modes?
- Base addressing - Absolute addressing - Indexed addressing - Indirect addressing - Direct addressing
50
Which virtual memory address mode is the origin for calculating other addresses? - Base addressing - Absolute addressing - Indexed addressing - Indirect addressing - Direct addressing
- Base addressing
51
Which virtual memory address mode identifies a location without reference to the base address, or it may be the base address itself? - Base addressing - Absolute addressing - Indexed addressing - Indirect addressing - Direct addressing
- Absolute addressing
52
Which virtual memory address mode specifies an address relative to an index register? If the index register changes, the resulting memory location changes) - Base addressing - Absolute addressing - Indexed addressing - Indirect addressing - Direct addressing
- Indexed addressing
53
Which virtual memory address mode contains the address to the final desired location in memory? - Base addressing - Absolute addressing - Indexed addressing - Indirect addressing - Direct addressing
- Indirect addressing
54
Which virtual memory address mode specifies the address of the final desired memory location? - Base addressing - Absolute addressing - Indexed addressing - Indirect addressing - Direct addressing
- Direct addressing
55
What is the difference between virtual memory and virtual addressing?
virtual memory combines physical memory and hard disk space to create more apparent memory whereas virtual addressing is the method used by applications and programs to specify a desired location n physical memory
56
What is firmware?
A program or set of computer instructions stored in the physical circuitry of ROM memory.
57
BIOS is a common example of firmware. True or False?
True
58
What does BIOS stand for?
Basic Input-Output System
59
What does a computer BIOS do?
Contains instructions needed to start a computer when it is first powered on
60
What are the 3 main components of an operating system?
- Kernel - Device Drivers - Tools
61
What is the core component of an operating system, that allows processes, controls hardware devices and communication to external devices that may be connected to the computer?
Kernel
62
What are the 6 main functions of the OS?
- Process management - Resource Management - I/O device management - memory Management - File management - Communications Management
63
Virtualisation - What is a hypervisor?
software program that allocates resources for each resident OS and serves as an OS for multiple OS's
64
The entire compliment of protection mechanisms within a computer system that's responsible for enforcing a security policy (hardware, firmware, software) is otherwise known as what?
Trusted Computing Base (TCB)
65
The ability to permit or deny the use of an object by a subject is otherwise known as what?
Access Control
66
What is the system component called that enforces access control on an object?
Reference Monitor
67
What is a security kernel?
It's the combination of hardware, firmware, software elements in a TCB that implements the reference monitor concept
68
What are the 3 requirements of the security kernel?
- Mediate all access - Be protected from modification - Be verified as correct
69
What is the "Security Mode of Operation"?
describes how a system handles stored information at various classification levels
70
What are the four system classification levels commonly assigned to authorised user's by the US military?
- Dedicated - System High - Multi-level - Limited access
71
Which of the following system classification levels requires that all authorised users have a clearance level equal to or higher than the highest level of information processed on the system and a valid need to know? - Dedicated - System High - Multi-level - Limited access
- Dedicated
72
Which of the following system classification levels requires that all authorised user have a clearance level equal to or higher than the highest level of information processed on the system, but a valid need to know isn't necessarily required? - Dedicated - System High - Multi-level - Limited access
- System High
73
Which of the following system classification levels is information at different classification levels stored or processed on a TCB and where authorised users must have an appropriate classification level, but access restrictions are enforced by the system accordingly? - Dedicated - System High - Multi-level - Limited access
- Multi-level
74
Which of the following system classification levels doesn't require authorised user's to have security clearance , but the highest level of information on the system is Sensitive But Unclassified? (SBU) - Dedicated - System High - Multi-level - Limited access
- Limited Access
75
A Trusted Computer System is a system with a Trusted Computer Base. True or False?
True
76
What are the four types of security designs that can protect a system during hardware/software failure?
- Fault tolerant - Fail-safe - Fail-soft (resilient) - Fail-over
77
Which of the four recovery procedures is used were the system continues to operate after the failure of a computer or network component? - Fault tolerant - Fail-safe - Fail-soft (resilient) - Fail-over
- Fault tolerant
78
Which of the four recovery procedures describes when a hardware or software failure is detected, a program execution is terminated and the system is protected from compromise? - Fault tolerant - Fail-safe - Fail-soft (resilient) - Fail-over
Fail-safe
79
Which of the four recovery procedures desribes when a hardware or software failure is detected, certain non-critical processing is terminated and the computer or network continues to function in a degraded mode? - Fault tolerant - Fail-safe - Fail-soft (resilient) - Fail-over
Fail-soft (resilient)
80
Which of the four recovery procedures describes when a hardware or software failure is detected, the system automatically transfers processing to a component, such as a clustered server? - Fault tolerant - Fail-safe - Fail-soft (resilient) - Fail-over
Fail-over
81
Which recovery procedure is used where a system must be able to detect & correct or circumvent a system fault? - Fault tolerant - Fail-safe - Fail-soft (resilient) - Fail-over
Fault tolerant
82
Name 5 common types of security architecture vulnerabilities?
- Covert channels - Rootkits - Race conditions - State attacks - Emanations
83
Security Architecture Vulnerabilities: What is a covert channel?
Unknown, hidden communication that take place within the medium of a legitimate communications channel
84
Security Architecture Vulnerabilities: What is a rootkit?
Rootkits use various techniques to hide themselves within the target system
85
Security Architecture Vulnerabilities: What are race conditions?
A flaw in the system where the output or result of an activity in the system is unexpectedly tied to the timing of other events.
86
Security Architecture Vulnerabilities: What is a state attack?
Commonly used on web-based applications that involves an attacker stealing a user's session ID and thus compromising the application.
87
Security Architecture Vulnerabilities: What are emanations?
The unintentional emissions of electromagnetic or acoustic energy that can be intercepted by eavesdroppers.
88
In relation to race conditions, what is the-time-of-check-to-time-of-use bug?
Two programs that try to open the same file for exclusive use are able to open the file, when only one should be able to.
89
What term is used to describe multiple layers of protection?
Defence in depth
90
Name 6 common types of system hardening:
- Remove all unnecessary components - Remove all unnecessary accounts - Close all unnecessary network listening ports - Change default passwords - All necessary programs should run at the lowest possible privilege - Install security patches
91
What is a heterogeneous environment?
An environment that contains a variety of different systems, ie Windows Server, Linux, Solaris
92
What is the advantage of a heterogeneous environment?
various types of systems may not possess common vulnerabilities making them harder to attack
93
What is a homogeneous environment?
one were all of the environments are the same. ie all servers on Windows Server 2008
94
What is the disadvantage of a homogeneous environment?
weakness in one system could mean weakness in all meaning if one is compromised so could all
95
What are two types of system resilience?
- Filter malicious input | - Redundant components
96
What is "Filter malicious input" in relation to system resilience?
System can recognise and reject input that may be an attack
97
What are redundant components in relation to system resilience?
System contains redundant components that permit the system to continue running even when hardware failures or malfunctions occur
98
Name 4 types of redundant components in relation to system resilience?
- multiple power supplies - multiple network interfaces - redundant storage techniques (RAID) - redundant server architecture (clustering)
99
What is a maintenance hook?
Hidden, undocumented features in software programs that are intended to inappropriately expose data or functions for illicit use.
100
Name 4 common types of security countermeasures that a security expert should consider to implement against a hacker
- Reveal as little info as possible, ie don't display OS, database, app version. - Limit access based on role - Disable unnecessary services - Use strong authentication
101
What is TEMPEST?
testing of electromagnetic frequencies emanating from systems
102
TEMPEST: what are the 3 levels of protection depending on the distance between an attacker and target system?
Level 1 - Systems with only 1 metre of safe distance Level 2 - Systems with 20 metres of safe distance Level 3 - Systems with 100 metres of safe distance
103
Bell LaPadula, Access Matrix and Take-Grant address which principle of CIA?
Confidentiality
104
Biba and Clark-Wilson address which principle of CIA?
Integrity
105
The basic premise of Bell LaPadula is that information cannot flow downward. True or False?
True
106
What is the "Simple Security Property" (SS Property)
A subject can't read information from an object that has a higher sensitivity label than the subject (also known as no read up or NRU)
107
What is the *-property (star property)
A subject can't write information to an object that has a lower sensitivity label than the subject. (also known as no write down or NWD)
108
Is Bell LaPadula a discretionary or mandatory access control system?
Mandatory
109
What two additional properties can provide Bell LaPadula with the flexibility of a discretionary access control system?
- Discretionary Security Property | - Trusted Subject
110
What is the discretionary security property in relation to Bell LaPadula?
determines access based on an access matrix
111
What is a "trusted subject" in relation to Bell LaPadula?
A trusted subject is an entity that can violate the *-property but not its intent
112
What access rights to an object does the Access Matrix model provide for a subject?
Read / Write / Execute (R/W/X)
113
Is the Access Matrix model a discretionary or mandatory access model?
Discretionary
114
What is the Take-Grant system?
specifies the rights that a subject can transfer to or from another subject or object
115
Take-Grant specifies rights through 4 basic operations. What are they?
Create, Revoke, Take and Grant
116
Which integrity is a lattice-based model and only address the first goal of integrity, ie ensuring that modifications to data aren't made by unauthorised user's or processes?
Biba
117
What are the two properties of Biba?
Simple Integrity Property | *-integrity property (Star Integrity Property)
118
In relation to Biba, what is the Simple Integrity Property?
A subject can't read information from an object that has a lower integrity level than the subject. (otherwise known as no read down)
119
In relation to Biba, what is the *-integrity property?
A subject can't write information to an object that has a higher integrity level than the subject (otherwise known as no write up)
120
Which integrity model meets the following criteria? - establishes a security framework for use in commercial activities, such as the banking industry - addresses all 3 goals of integrity - identifies special requirements for inputting data
Clark-Wilson
121
The Clark-Wilson model specified which 4 requirements for inputting data?
Unconstrained Data Item (UDI) Constrained Data Item (CDI) Integrity Verification procedures (IVP) Transformation Procedures (TP)
122
What is Unconstrained Data Item (UDI)?
data outside the control area such as input data
123
What is Constrained Data Item (CDI)?
Data inside the control area (integrity must be preserved)
124
What are Integrity Verification Procedures (IVP) used for?
Checks validity of CDI's
125
What are Transformation Procedures (TP) used for?
Maintains integrity of CDI's
126
Which integrity model is based on the concept of a "well formed transaction", in which a transaction is sufficiently ordered and controlled so that it maintains internal and external consistency?
Clark-Wilson
127
Which Access Control model does the following describe? - based on flow of information rather than imposing access controls - uses a security policy to assign class, value and direction of flow from one application/system to another?
Information Flow Model
128
Which type of access control model is useful for analysing covert channels, through detailed analysis of the flow of information in a system including the sources of information and paths of flow?
Information Flow Model
129
Which Access Control Model ensures that the actions of different subjects and objects aren't seen by (and don't interfere with) other objects and subject on the same system?
Non-Interference Model
130
the standard fr quantifying the security of a computer system or network is known as?
Evaluation Criteria
131
What are the 4 common types of evaluation criteria?
- Common Criteria - Trusted Computer System Evaluation Criteria (TCSEC) - Trusted Network Interpretation (TNI) - European Information Technology Security Evaluation Criteria (ITSEC)
132
TCSEC is commonly known by which other name?
The Orange book
133
Which Evaluation Criteria is the formal implementation of the Bell LaPadula model? - Common Criteria - Trusted Computer System Evaluation Criteria (TCSEC) - Trusted Network Interpretation (TNI) - European Information Technology Security Evaluation Criteria (ITSEC)
TCSEC
134
What were the 3 objectives of TCSEC?
- Measurement - Guidance - Acquisition
135
In relation to TCSEC, which objective provides a metric for assessing comparative levels of trust between different computer systems? - Measurement - Guidance - Acquisition
- Measurement
136
In relation to TCSEC, which objective provides customers a standard for specifying acquisition requirements and identifying systems that meet those requirements? - Measurement - Guidance - Acquisition
- Acquisition
137
In relation to TCSEC, which objective identifies standard security requirements that vendors must build into systems to achieve a given trust level? - Measurement - Guidance - Acquisition
-Guidance
138
What are the 4 basic control requirements identified in the Orange Book?
- Security Policy - Assurance - Documentation - Accountability
139
What are the 4 specific requirements of the TCSEC security policy?
- Discretionary Access Control - Mandatory Access Control - Object Re-use - Labels
140
What does Object Re-Use protect against in relation to TCSEC?
protects confidentiality of objects that are re-assigned after initial use and can define procedures for actually erasing the data.
141
In which type of system are Labels required? | DAC or MAC systems?
MAC
142
What are the 3 labelling requirements of TCSEC?
integrity export subject/object
143
What is the difference between a "covert storage channel" and "covert timing channel"?
- covert storage channel conveys information by altering stored system data - covert timing channel covey's information by altering a system's resources, performance or timing.
144
What are the 9 operation assurance requirements in TCSEC?
- System Architecture: system design that implements specific security features - System Integrity: hardware and firmware tested to verify proper operation - Covert Channel Analysis: detect unintended communication paths not protected by a systems normal security mechanisms - Trusted Facility: assignment of an admin for security functions of system - Trusted Recovery: Ensures that security isn't compromised in the event of a system crash/failure - Security testing: Specifies required testing - Design specification and verification: requires mathematical and automated proof that design conforms with security policy - Configuration Management: recording of changes made to TCB during design, development, maintenance - Trusted Distribution: Protects system during transport from vendor to customer
145
What are the 3 requirements of Accountability in relation to TCSEC?
- Identification and Authentication - Trusted Path - Audit
146
What is the Trusted Path in TCSEC?
A direct communications path between the user and TCB that doesn't require interaction with untrusted applications or OS layers.
147
What are the 4 TCSEC requirements for Documentation?
- Security Features User Guide - Trusted Facility manual - Test documentation - Design documentation
148
The Orange Book defines four major hierarchical classes of security protection and numbered sub-classes. (higher number means higher security) What are they?
D: Minimal Protection C: Discretionary Protection (C1 and C2) B: Mandatory Protection (B1, B2, and B3) A: Verified Protection (A1)
149
What is Class D: Minimal Protection used for?
Systems that fail evaluation
150
What is the difference between Class 1 (Discretionary Protection) and Class 2 (Controlled Access Protection)?
In C1 a system doesn't have to distinguish between individual users and types of access whereas C2 does
151
B1 (Labelled Security Protection) has which requirement?
Sensitivity labels for all subjects and storage objects
152
B2 (Structured protection) has which 2 requirements?
Sensitivity labels for all subjects and objects and trusted path requirements
153
B3 (Security domains) has which requirement?
Access Control Lists and System must protect against covert channels
154
Which Class, C1 or C2 requires "Object Re-use" features?
C2 (Controlled Access Protection)
155
What are the 2 requirements of A1 (Verified Design)
- Formal Top level specification required | - configuration management procedures must be enforced throughout entire system life cycle.
156
What are the two requirements beyond the A1 class of protection for systems?
- Self-protection and reference monitors implemented in TCB | - TCB verified to source code level
157
``` Which of the following are MAC systems? D: Minimal Protection C: Discretionary Protection (C1 and C2) B: Mandatory Protection (B1, B2, and B3) A: Verified Protection (A1) ```
B: Mandatory Protection (B1, B2, and B3) A: Verified Protection (A1)
158
``` Which of the following are DAC systems? D: Minimal Protection C: Discretionary Protection (C1 and C2) B: Mandatory Protection (B1, B2, and B3) A: Verified Protection (A1) ```
C: Discretionary Protection (C1 and C2)
159
What are the 4 limitations of the Orange Book?
- Addresses only confidentiality issues - Isn't applicable to most commercial systems - emphasises protection from unauthorised access, however most violations involve insiders - Doesn't address networking issues
160
Which 2 elements of CIA does Trusted Network Interpretation address?
Confidentiality and Integrity
161
What is the Trusted network Interpretation otherwise known as?
The Red Book
162
What are the two parts of TNI?
- Part 1: A guideline for extending the system protection standards in TCSEC to cover networks. - Part 2: Additional security features such as Communication Integrity, protection from Denial of Service and Transmission Security
163
Which of the elements of CIA does ITSEC address?
All 3
164
ITSEC evaluates an entire system (defined as Target of Evaluation (TOE)) rather than a single computing platform. True or False?
True
165
ITSEC evaluates functionality and assurance separately. How many functionality classes and evaluation levels are there?
10 functionality classes and 7 evaluation levels
166
How ITSEC classes and levels compare to TCSEC
NA & E0 equivalent to D F-C1 & E1 equivalent to C1 F-C2 & E2 equivalent to C2 F-B1 & E3 equivalent to B1 F-B2 & E4 equivalent to B2 F-B3 & E5 equivalent to B3 F-B3 & E6 equivalent to A1 F-IN & NA equivalent to TOEs with high integrity requirements F-AV & NA equivalent to TOEs with high availability requirements F-DI & NA equivalent to TOEs with high integrity requirements during data communications F-DC & NA equivalent to TOEs with high confidentiality requirements during data communications F-DX & NA equivalent to Networks with high confidentiality and integrity requirements
167
What is the purpose of the Common Criteria?
To standardise and improve existing European and North American evaluation criteria
168
Which evaluation criteria is adopted as an international standard is ISO 15408?
Common criteria
169
How many Evaluation Assurance levels are there in common criteria?
8
170
Common criteria evaluation assurance levels along with TCSEC and ITSEC equivalents
``` EAL0 = NA = NA - Inadequate assurance EAL1 = NA = NA - Functionally tested EAL2 = C1 = E1 - Structurally tested EAL3 = C2 = E2 - Methodically tested and checked EAL4 = B1 = E3 - Methodically designed, tested, reviewed EAL5 = B2 = E4 - Semi formally designed and tested EAL6 = B3 = E5 - Semi formally verified designed/tested EAL7 = A1 = E6 - Formally verified design and tested ```
171
What is a Designated Approving Authority (DAA)?
An authority that grants accreditation of a system.
172
When should system certification and accreditation be verified?
When changes are made to the system and every 3 years
173
What are the two systems accreditation bodies for US military and government bodies respectively?
- the Defence Information Technology Security Certification and Accreditation Process (DITSCAP) - the National Information Assurance Certification and Accreditation Process (NIACAP)
174
What are the 4 phases of DITSCAP?
- Definition - Security requirements are determined by defining the organisation and system's mission, environment and architecture - Verification - Ensures a system undergoing development remains compliant with the "System Security Authorisation Agreement" (SSAA) - Validation - Confirms compliance with the SSAA - Post-accreditation - Represents ongoing activities required to maintain ongoing compliance and address new and evolving threats.
175
NIACAP consists of the same 4 phases as DITSCAP, however what are the 3 additional phases?
Site accreditation - All applications and systems at a specific location are evaluated. Type accreditation - A specific application or system for multiple locations is evaluated. System accreditation - A specific application or system at a specific location is evaluated
176
What is the Director of Central Intelligence Directive (DCID) 6/3?
the process used to protect sensitive information that stored on CIA computers.
177
What is the Zachman Framework?
allows for the communication and collaboration of all entities in the development of the architecture. provides logical structure for integrating the various perspectives such as the plan, design and build aspects.
178
What is the Sherwood Applied Business Security Architecture Framework (SABSA)?
follows same outline as Zachman. hollistic lifecycle for developing security architecture that starts with assessing business requirements and then creating a "chain of traceability"
179
What is "The Open Group Architecture Framework (TOGAF)?
open framework for architecture design
180
What is ITIL?
- collection of best practices for IT governance - defines structure and skill requirements - sets operational procedures and practices
181
What is the Lipner Model?
combines elements of BellLaPadula and Biba with the idea of job functions or roles in a novel way to protect confidentiality and integrity.
182
What is the Brewer Nash Chinese Wall Model?
focuses on preventing conflict of interest when a given subject has access to objects with sensitive information associated with two competing parties.
183
What is the Graham Denning Model?
concerned with how subjects and objects are created, assigned rights and how ownership of objects is managed.
184
What is the Harrison-Ruzzo-Ullman model?
similar to Graham Denning and is composed of generic rights and a finite set of commands. also concerned with situations where a subject should be restricted from gaining particular privileges.
185
Which ISO standards are considered the stanard for security practices?
27001 and 27002
186
What is 27001 focused on?
standardisation and certification of an organisations ISMS. (security governance)
187
What does 27002 provide?
code of practice for information security management. lists security control objectives and rcomends range of security controls. is more of a guideline
188
What is COBIT?
- framework for IT management
189
What is Middleware?
connectivity software