Week 4 Flashcards

(40 cards)

1
Q

What is the flow of data assets to an unauthorized external party?

jpresue

A

Data Leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data at rest is commonly

A

Stored in external storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Method of storing data encryption keys to a certified third party

A

key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CPTED means

A

Crime Prevention Through Environmental Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fundamental organization of a system embodied in its components, their relationships to each other and to the environment, and the principles guiding its design and evolution.

A

Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Collection of document types to convey an architecture in a formal manner

A

Architecture Description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Individual, team, or organization with interests in or concerns relative to a system

A

Stakeholder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Representation of a whole system from the perspective of a related set of concerns

A

View

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Specification of the conventions for constructing and using a view

A

Viewpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer Architecture encompasses what?

A

Operating system
Memory chips
Logic circuits
Storage devices
Input and output devices
Networking component
Data, memory and control buses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Five responsibilities of memory manager

A

Relocation, Protection, Sharing, Logical Organization, Physical Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To make sure a process only interacts with its memory segment, what does the CPU use?

A

Base Register, Limit Register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Reserved Hard drive space used to extend RAM capabilities

A

Swap Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Referred to as “The Big Mess” because of lack of structure

A

Monolithic Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sample of MOnolithic Operating System

A

MS DOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Separates system functionality into hierarchical layes

A

Layered Operating System Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

THE stands for

A

TechnischeHogeschoolEindhoven multiprogramming system

18
Q

How many layers does THE has?

19
Q

2 types of security models

A

Lattice-based model, Rule-based model

20
Q

Layer Based security model?

A

Lattice-based

21
Q

Specific rules dictate how security operates

22
Q

state machine model that enforces the confidentiality aspects of access control that was developed in the 1970s

A

Bell-LaPadula

23
Q

System that employs the Bell-LaPadula model

A

multilevel security system

24
Q

Main rules used and enforced in Bell-LaPadula model

A

Simple Security, Star Property, Strong Star Property

25
State machine model that is developed after bell-lapadula
Biba Model
26
3 main rules of Biba Model
Integrity Axiom, Simple Integrity Axion, Invocation Property
27
Model that separates data into Subsets
Clark-Wilson Model
28
Also Called the Chinese Wall model; was created to provide access controls that can change dynamically depending upon a user's previous actions
Brewer & Nash Model
29
Addresses and defines a set of basic rights in terms of commands that a specific subject can execute on an object
Graham-Denning
30
Operating System level computer security model, which deals with the integrity of access rights
Harrison, Ruzzo, Ullman Model
31
When was the first version of Common Criteria released?
1993
32
Common Criteria is also called
ISO 15408
33
Comprehensive technical evaluation of the security components and their compliance for the purpose of accreditation
Certification
34
Provides proof of the origin, authenticity and integrity of data
non-repudiation
35
mathematical function that converts any digital data into an output string with a fixed number of characters
Hash Function
36
Happens when two different inputs have the same output when passed through a hash algorithm
Collision
37
Encryption algorithm that utilizes the SAME KEY for encryption and decryption
Symmetric Encryption
38
Algorithm that utilizes public and private key
Asymmetric Encryption
39
number of bits in a key used by a cryptographic algorithm
Key Space
40