Week 4 Flashcards
(40 cards)
What is the flow of data assets to an unauthorized external party?
jpresue
Data Leakage
Data at rest is commonly
Stored in external storage devices
Method of storing data encryption keys to a certified third party
key escrow
CPTED means
Crime Prevention Through Environmental Design
Fundamental organization of a system embodied in its components, their relationships to each other and to the environment, and the principles guiding its design and evolution.
Architecture
Collection of document types to convey an architecture in a formal manner
Architecture Description
Individual, team, or organization with interests in or concerns relative to a system
Stakeholder
Representation of a whole system from the perspective of a related set of concerns
View
Specification of the conventions for constructing and using a view
Viewpoint
Computer Architecture encompasses what?
Operating system
Memory chips
Logic circuits
Storage devices
Input and output devices
Networking component
Data, memory and control buses
Five responsibilities of memory manager
Relocation, Protection, Sharing, Logical Organization, Physical Organization
To make sure a process only interacts with its memory segment, what does the CPU use?
Base Register, Limit Register
Reserved Hard drive space used to extend RAM capabilities
Swap Space
Referred to as “The Big Mess” because of lack of structure
Monolithic Operating System
Sample of MOnolithic Operating System
MS DOS
Separates system functionality into hierarchical layes
Layered Operating System Architecture
THE stands for
TechnischeHogeschoolEindhoven multiprogramming system
How many layers does THE has?
5
2 types of security models
Lattice-based model, Rule-based model
Layer Based security model?
Lattice-based
Specific rules dictate how security operates
Rule-Based
state machine model that enforces the confidentiality aspects of access control that was developed in the 1970s
Bell-LaPadula
System that employs the Bell-LaPadula model
multilevel security system
Main rules used and enforced in Bell-LaPadula model
Simple Security, Star Property, Strong Star Property