Vulns, Threats, CounterMeasures Flashcards

(48 cards)

1
Q

Processor

A

CPU. Governs all major operators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multi-tasking

A

Processor Execution Type. Handling 2+ tasks simultaneously, more simulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Multi-processing

A

System with more than one processor (CPU) to complete the execution of a single application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Processor Execution Types

A

Multi-tasking
Multi-processing
Multi-threading
Multi-programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SMP / MPP

A

Multi-processing
Symmetric multiprocessing: single computer with multiple processors treated equally, controlled by single OS

Massively parallel processing: tons of processors, each with dedicated resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multi-programming

A

Similar to multi-tasking. OS coordinates pseudosimultaneous execution of two tasks on a single processor

Batch/serialize multiple processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multi-threading

A

Multiple concurrent tasks to be performed within a single process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Single State/Multi State (processing types)

A

Single: a processor/system only handles one level of security/data. Policy.

Multi-state: can handle multiple levels of security by leveraging protection mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protection Rings

A

L0: OS Kernel/Memory
L1: OS components
L2: Drivers, protocols, etc.
L3: User / programs, application (user mode)

mediated access model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Process States

A
Ready
Waiting
Running
Supervisory
Stopped
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Modes

A

Dedicated
System High
Compartmented
Multilevel

Valid Sec Clearance
Access approval for all info processed by system
Valid NTK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Operating Modes

A

User Mode

System Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Read-only memory

A

ROM. Can’t be altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PROM

A

Programmable ROM. User can burn in contents later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EPROM

A

erasable PROM. EEPROM, UVEPOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flash memory

A

Derivative of EEPROM. NAND flash, used in memory cards, thumb drives, mobile devices, SSDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RAM

A

Random access memory. Readable/writeable memory that CPU uses during processing.

Only exists when power on. Temp storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Real memory

A

Main/primary memory. Largest RAM storage on computer. Dynamic RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cache RAM

A

Taking data from slower devices and temporarily loading it in faster devices for high repeat use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dynamic vs static ram

A

Dynamic: capacitors. CPU must spend time refreshing contents to ensure integrity.

Static: flip-flop. More costly, much faster.

21
Q

Registers

A

Onboard memory on CPU, directly accessible data to ALU (arithmetic logical unit)

22
Q

Register Addressing

A

“Register 1”

23
Q

Immediate addressing

A

“Add 2 to register 1”

24
Q

Direct addressing

A

CPU is given actual address of memory location

25
Indirect addressing
Memory address points to intermediate memory address of actual locatino
26
Memory Addressing
``` Register Immediate Direct Indirect BaseOffset ```
27
Secondary Memory
Magnetic, optical, flash-based media/other that contain data not available to CPU. Much cheaper.
28
Virtual Memory
type of secondary memory. | Pagefile is most common. Paging - brings data from disk back into real memory
29
Memory security issues
Proper erasure Theft Freezing Access data stored in memory while in use
30
Primary vs secondary storage
Primary storage = primary memory == RAM. | Secondary storage = secondary memory = .. all
31
Volatile vs non-volatile
How likely it is to lose data when power is off
32
Random vs sequential
Random: can access any data wherever whenever.
33
Storage Media security
Data Remanence SSD sanitization Theft Access to data
34
Phreaking
Van eck phreaking - TEMPEST. Getting monitor data from afar
35
Modems
Suck. remove them.
36
Memory-mapped I/O
Indirect mapping between CPU addresses and actual address.
37
Interrupt IRQ
Device sends signal on assigned IRQ. OS must control access to IRQs
38
Direct memory access
DMA, DACK. OS brokers once, CPU gets out of way. Devices exchange data with real memory directly.
39
Firmware
software stored on ROM chip.
40
BIOS
Basic input/output system. Independent instructinos that a computers needs to start up and load the OS from disk.
41
BIOS
Basic input/output system. Independent instructinos that a computers needs to start up and load the OS from disk.
42
phlashing
malicious code embedding itself into BIOS/firmware.
43
Applets
Mini programs sent from server to a client. But expose client to remote-send code to be executed Java ActiveX
44
Local Cache issues
``` ARP Poisoning DNS cache poisoning HOSTS file Authorizing DNS attacks Cache DNS server attacks DNS query spoofing Temporary internet files ```
45
Database security
``` Aggregation Inference Data Mining Data Warehousing Data Analytics ```
46
Mobile Device Security
Device security: encryption, remote wiping, lockout, screen locks, GPS, app control, storage segmentation, asset tracking, inventory control, MDM, device access control, removable storage, disabling unused features
47
App Sec
Key mgmt, Cred mgmt, Auth, geotagging, encryption, app whitelisting
48
BYOD concerns
data ownership, support ownership, patch mgmt, av mgmt, forensics, privacy, on/off boarding, adherence to corporate policies, user acceptance, legal concerns, camera/videos