7 - 2: Hardware Security Flashcards

1
Q

Encryption

A

Either entire files or full-disk encryption (FDE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hardware Security Module

A

Use dedicated hardware to perform encrypt/decrypt, in a way that takes resource demand off the computer itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trusted Platform Module

A

A physical chip that contains decryption keys. If the correct TPM is not present for it’s drive, the drive cannot be decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Self-encrypting drive

A

A drive that has its own encryption technology in addition to the drive itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Opal Storage specification

A

A self-encrypting drive standard produced by the Trusted Computing Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BIOS

A

Basic Input/Output System, the lightweight operating system stored in firmware that provides basic functionality to load the full OS from disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UEFI

A

Unified Extensible Firmware Interface, a more flexible firmware for boot. Includes secure boot function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure Boot

A

1) Reads the first piece of the OS, boot loader
2) Computes the boot loader hash value
3) Decrypts the boot loader’s digital signature
4) Verifies the signature is accurate

If it isn’t the right OS, it stops at UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Remote Attestation

A

A compliance report of calculated hash values sent to an external server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Measured Boot

A

Each step of boot measures the level of trust of sequential steps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Measured Boot Attestation

A

Trusted hashes are stored in the TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hardware Root of Trust

A

Stores keys to validate UEFI hardware within its own storage location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Electromagnetic Interference

A

EMI, electromagnetic waves that can alter or disrupt computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless devices

A

Use the same protocols within Wi-Fi and Bluetooth to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Removable storage

A

Represent a way to steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Printers

A

1) They’re basically a computer, therefore require patches
2) Use web servers to connect for administrative functions
3) Network traffic is equally vulnerable as any other network communication
4) Have their own storage, which may contain residual data