Week 4 Flashcards

1
Q

What is the flow of data assets to an unauthorized external party?

jpresue

A

Data Leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data at rest is commonly

A

Stored in external storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Method of storing data encryption keys to a certified third party

A

key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CPTED means

A

Crime Prevention Through Environmental Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fundamental organization of a system embodied in its components, their relationships to each other and to the environment, and the principles guiding its design and evolution.

A

Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Collection of document types to convey an architecture in a formal manner

A

Architecture Description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Individual, team, or organization with interests in or concerns relative to a system

A

Stakeholder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Representation of a whole system from the perspective of a related set of concerns

A

View

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Specification of the conventions for constructing and using a view

A

Viewpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer Architecture encompasses what?

A

Operating system
Memory chips
Logic circuits
Storage devices
Input and output devices
Networking component
Data, memory and control buses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Five responsibilities of memory manager

A

Relocation, Protection, Sharing, Logical Organization, Physical Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To make sure a process only interacts with its memory segment, what does the CPU use?

A

Base Register, Limit Register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Reserved Hard drive space used to extend RAM capabilities

A

Swap Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Referred to as “The Big Mess” because of lack of structure

A

Monolithic Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sample of MOnolithic Operating System

A

MS DOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Separates system functionality into hierarchical layes

A

Layered Operating System Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

THE stands for

A

TechnischeHogeschoolEindhoven multiprogramming system

18
Q

How many layers does THE has?

A

5

19
Q

2 types of security models

A

Lattice-based model, Rule-based model

20
Q

Layer Based security model?

A

Lattice-based

21
Q

Specific rules dictate how security operates

A

Rule-Based

22
Q

state machine model that enforces the confidentiality aspects of access control that was developed in the 1970s

A

Bell-LaPadula

23
Q

System that employs the Bell-LaPadula model

A

multilevel security system

24
Q

Main rules used and enforced in Bell-LaPadula model

A

Simple Security, Star Property, Strong Star Property

25
Q

State machine model that is developed after bell-lapadula

A

Biba Model

26
Q

3 main rules of Biba Model

A

Integrity Axiom, Simple Integrity Axion, Invocation Property

27
Q

Model that separates data into Subsets

A

Clark-Wilson Model

28
Q

Also Called the Chinese Wall model; was created to provide access controls that can change dynamically depending upon a user’s previous actions

A

Brewer & Nash Model

29
Q

Addresses and defines a set of basic rights in terms of commands that a specific subject can execute on an object

A

Graham-Denning

30
Q

Operating System level computer security model, which deals with the integrity of access rights

A

Harrison, Ruzzo, Ullman Model

31
Q

When was the first version of Common Criteria released?

A

1993

32
Q

Common Criteria is also called

A

ISO 15408

33
Q

Comprehensive technical evaluation of the security components and their compliance for the purpose of accreditation

A

Certification

34
Q

Provides proof of the origin, authenticity and integrity of data

A

non-repudiation

35
Q

mathematical function that converts any digital data into an output string with a fixed number of characters

A

Hash Function

36
Q

Happens when two different inputs have the same output when passed through a hash algorithm

A

Collision

37
Q

Encryption algorithm that utilizes the SAME KEY for encryption and decryption

A

Symmetric Encryption

38
Q

Algorithm that utilizes public and private key

A

Asymmetric Encryption

39
Q

number of bits in a key used by a cryptographic algorithm

A

Key Space

40
Q
A