3.4 Vulns, Threats, Countermeasures Flashcards

1
Q

protection rings

A

0 OS kernel / memory (priv.)
1 other OS components (priv.)
2 drivers, protocols (priv.)
3 user level programs, apps (user mode)

communication via system calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

memory

A

ROM: not writable
PROM: once writable
EPROM: rewritable, uv light
EEPROM: rewritable, electrical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

covert channel

A

any method that is used to pass information over a path that is not normally used for communication and not protected. violates sec policy

storage channels
timing channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TOCTOU

A

time-of-check-to-time-of-use discrepancy could be an opportunity for an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

security modes

A

dedicated systems: clearance, permissions and need to know for all users and info

system high mode: clearance, permissions — minus need to know

compartmented mode: clearance — minus access permissions and need to know

multilevel: no requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

execution types

A

only multiprocessing uses more than 1 cpu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WORM storage

A

write once read many

used to support records retention for legal or regulatory compliance. assures integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DEP

data execution prevention

A

prevents data execution in memory locations that are not predefined to contain executable content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ASLR

assress space layout randomizatio

A

makes explotation difficult by randomizing memory addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

government cloud

A

keeps data and resources contained within the borders of one country

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

maintenance hook

A

backdoor by system designers for effective system checking during development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OWASP

open web app security project

A

OWASP TOP10 provides guidance on 10 most significant app sec risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly