Security Engineering Flashcards

1
Q

Ability to deduce (infer) sensitive or restricted information from observing available information.

A

Inference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Primarily concerned with how subjects and objects are created, assigned rights or privileges, and how ownership is managed.

A

Graham-Denning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defines the organizational structure and skill requirements of an IT Org as well as the set of operational procedures & practices that direct IT operations & infrastructure, including information Security operations

A

IT Infrastructure Library (ITIL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password

A

Key Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Formula to determine how many keys in PKI environment

A

N(N-1)/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The size of the key, usually measured in bits or bytes, which a cryptographic algorithm used in ciphering or deciphering protected information.

A

Key Length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Performs certificate registration services on behalf of a CA

A

Registration Authority (RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Involves the removal of characteristics from an entity in order to easily represent its essential properties

A

Abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The study of techniques for attempting to defeat cryptography techniques and information security services

A

Cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Smart networked systems with embedded sensors, processors, & actuators that are designed to sense & interact with the physical world & support real-time, guaranteed performance in safety-critical apps

A

Cyber-Physical Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Maintains activities at different security levels to separate these levels from each other

A

Data Hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The science that deals with hidden, disguised, or encrypted communications. It embraces communications security & communications intelligence

A

Cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A repository for information collected from a variety of data sources.

A

Data Warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Electronic document that contains the name of an Org or individual, business address, digital signature of the CA issuing the certificate, the certificate holder’s public key, a serial number, & expiration date

A

Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Provided by mixing up the location of the plaintext throughout the ciphertext

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The reverse process from encoding-converting the encoded message back into its plaintext format

A

Decoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attempt to take advantage of how a system handles multiple requests

A

State Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Holistic life cycle for developing security architecture that begins with assessing business requirements & subsequently creating a “chain of traceability” through the phases of strategy, concept, design, implementation, & metrics

A

Sherwood Applied Business Security Architecture Framework (SABSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Diving a computer’s memory into segments

A

Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An area or grouping within which a defined set of security policies & measures are applied to achieve a specific level of security

A

Security Zone of Control

21
Q

An XML-based standard used to exchange authentication & authorization information.

A

Security Assertion Markup Language (SAML)

22
Q

Holds data not currently being used by the CPU & is used when data must be stored for an extended period of time using high-capacity, nonvolatile storage.

A

Secondary Storage

23
Q

Provides a structured methodology for documenting security requirements, documenting & validating security capabilities, & promoting international cooperation in the area of IT Security

A

Common Criteria

24
Q

Provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns.

A

Community Cloud Infrastructure

25
Q

Provided by mixing (changing) the key values used during the repeated rounds of encryption. When the key is modified for each round, it provides added complexity that the attacker would encounter.

A

Confusion

26
Q

Provides a set of generally accepted processes to assist in maximizing the benefits derived using IT & developing appropriate IT governance

A

Control Objectives for Information and Related Technology (COBIT)

27
Q

Communications mechanisms hidden from the access control & standard monitoring system of an information system.

A

Covert Channels

28
Q

Logical structure for identifying & organizing the descriptive representations (models) that are important in the management of enterprises & to the development of the systems, both automated & manual, that comprise them.

A

Zachman Framework

29
Q

Represents the time & effort required to break a protective measure.

A

Work Factor

30
Q

Process of reordering the plaintext to hide the message.

A

Transposition

31
Q

Architecture content framework (ACF) to describe standard building blocks & components as well as numerous references models.

A

The Open Group Architecture Framework (TOGAF)

32
Q

Core of an OS, & one of its main functions is to provide access to system resources, which includes the system’s hardware & processes.

A

System Kernel

33
Q

A non-secret binary vector used as the initializing input algorithm for the encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance & to synchronize cryptographic equipment.

A

Initialization Vector

34
Q

Composition of two or more distinct cloud infrastructures (private, community, cloud, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data & application portability.

A

Hybrid Cloud Infrastructure

35
Q

Action of changing a message into another format through the use of a code.

A

Encoding

36
Q

Used to provide computing services in a small form factor with limited processing power.

A

Embedded Systems

37
Q

Provide authentication of a sender & integrity of a sender’s message.

A

Digital Signature

38
Q

A broad range of technologies that grant control & protection to content providers over their own digital media

A

Digital Rights Management (DRM)

39
Q

Provides a foundation upon which organizations can establish & review information technology security programs.

A

“Generally Accepted Principles & Practices for Securing Information Technology Systems” (NIST SP 800-14)

40
Q

The storage of programs or instructions in ROM.

A

Firmware

41
Q

Focused on setting the long-term strategy for security services in the enterprise.

A

Enterprise Security Architecture (ESA)

42
Q

Used to control industrial processes such as manufacturing, product handling, production, & distribution.

A

Industrial Control Systems (ICS)

43
Q

Accepts an input message of any length & generates, through a one-way operation, a fixed-length output.

A

Hash Function

44
Q

Describes the essential characteristics of an organization’s security engineering process that must exist to ensure good security engineering.

A

ISO/IEC 21827:2008, The Systems Security Engineering - Capability Maturity Model (SSE-CMM)

45
Q

Process of exchanging one letter or byte for another.

A

Substitution

46
Q

Operate with a single cryptographic key that is used for both encryption & decryption of the message.

A

Symmetric Algorithms

47
Q

When a cryptosystem performs its encryption on a bit-by-bit basis.

A

Stream-based Ciphers

48
Q

Describes the behavior of a system as it moves between one state & another, from one moment to another.

A

State Machine Model