9 - Security Vulnerabilities, Threats, and Countermeasures Flashcards

1
Q

What is Computer Architecture?

A

An engineering discipline concerned with the design and construction of computing systems at a logical level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Hardware?

A

The physical components of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a processor?

A

A processor (or microprocessor/central processing unit) is the computer’s nerve center. It governs all major operations and either directly performs or coordinates the calculations that allow a computer to perform its intended tasks.

The CPU is designed to perform a limited set of tasks that the OS and compiler break down for it which allows it to perform computational and logical tasks at blazing speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the different execution types of processing?

A
  • Multitasking: Handling two or more tasks at once.
  • Multicore: A chip/CPU containing 2, 4, 8, or potentially dozens of independent execution cores that can operate simultaneously.
  • Multiprocessing: A multiprocessor computing system where a complex query is distributed amongst all the processors.
    • Simple Multiprocessing (SMP): Where a single computer contains multiple processors that are treated equally and controlled by a single operating system. Processors share the OS, common data bus, and memory resources. Good for simple operations at high speeds.
    • Massively Parallel Processing (MPP): Systems that house hundreds or thousands of processors, each of which has its own operating system and memory/bus resources. A single processor will break down a computationally complex task into manageable parts and distributes them to other processors for execution. After the task is completed, results are sent to the coordinating processor for assembly and returned to requesting application. Good for processing very large, complex, intensive tasks.
  • Multiprogramming: Pseudosimultaneous execution of two tasks on a single processor coordinated by the operating system. When one process stops to wait on peripheral, its state is saved and the next process in line begins. The first process does not resume until all processes in the batch have had a chance to execute and stop for a peripheral. Total time for all processes is reduced in theory. Usually found in legacy systems and generally coordinated by separate software.
  • Multithreading: Permits multiple concurrent tasks to be performed within a single process.
    • Thread: A self-contained sequence of instructions that can execute in parallel with other threads that are part of the same parent process.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the different security states of a system?

A
  • Single State: A system that only handles one security level at a time. Only users who are approved for that level can use that machine.
  • Multistate: Certified to handle multiple levels of security simultaneously by using security mechanisms that prevent information from crossing security levels.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the different Protection Mechanisms?

A
  • Protection Rings: Organized code and components of an OS into concentric rings. The deeper inside you go the higher the privilege level the code which has access to more resources and allows runs first. Generally used in a four ring model:
    • Ring 0: OS Kernel/memory
    • Ring 1: Other OS components
    • Ring 2: Drivers/Protocols, etc.
    • Ring 3: User-level Programs and Applications
    • Mediated-Access Model: Where higher-numbered processes must ask a handler (system call) for access to a lower-numbered process.
    • Modern OS’s break memory into 2 segments:
      • Kernel/Privileged Mode
      • User Mode
  • Process States (Operating States): Various forms of execution in which a process may run.
    • Where an OS is concerned, processes can be classified as:
      • Supervisor State: Privileged, all-access
      • Problem State: User state.
    • Ready State: Process is ready to resume or begin processing as soon as it is scheduled for execution.
    • Waiting State: Process is ready for continued execution but is waiting for a device or access request to be serviced before it can continue processing.
    • Running State: Process executes on the CPU and keeps going until it finishes, its time slice expires, or it is blocked for some reason.
    • Supervisory: When the process must perform an action that requires privileges that are greater than the problem state’s set of privileges.
    • Stoppped: Process finishes or must be terminated.
  • Security Modes: 4 modes designated by US gov for systems that process classified info:
    • Dedicated Mode: Equivalent to single state systems.
      • Each user must have a security clearance that permits access to all information processed by the system.
      • Each user must have access approval for all the information processed by the system
      • Each user must have a valid need to know for all information processed by the system.
    • System High Mode:
      • Each user must have a security clearance that permits access to all information processed by the system.
      • Each user must have access approval for all the information processed by the system
      • Each user must have a valid need to know for some information processed by the system but not necessarily all information processed by the system.
    • Compartmented Mode:
      • Each user must have a security clearance that permits access to all information processed by the system.
      • Each user must have access approval for any information they will have access to on the system.
      • Each user must have a valid need to know for all information they will have access to on the system.
      • Compartmented Mode Workstations: Users with necessary clearances can process multiple compartments of data at the same time.
        • Sensitivity Labels: Describe the levels at which objects must be protected
        • Information Labels: Prevent data overclassification and associate additional information with the objects.
    • Multilevel Mode (Controlled Security Mode):
      • Some users do not have a valid security clearance do not have access to all info processed by a system so access is controlled.
      • Each user must have access approval for all information they will have access to on the system.
      • Each user must have a valid need to know for all information they will have access to on the system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different privilege-based Operating Modes the processor supports?

A
  • User Mode: The basic mode used by the CPU when executing user applications. Protects from accidentally running code that could accidentally (or intentionally) damage the system. Processes are often executed in a controlled environment called a virtual machine (VM) which is isolated from other VM’s and processes.
  • Privileged Mode: Designed to give the OS full access to the CPU’s full instruction set. Only OS components are generally allowed to run in this mode. Different names for this mode include:
    • Privileged Mode
    • Supervisory Mode
    • System Mode
    • Kernel Mode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is memory and what are the different kinds?

A
  • Memory: The storage bank of information that the computer needs to keep readily available.
    • Read-Only Memory (ROM): Memory the PC can read but cannot change. The contents are burned in at the factory. Generally important information the computer needs to boot up.
      • Programmable Read-Only Memory (PROM): Similar to ROM but the burning of data can be done by the end user, only once!
      • Erasable Programmable Read-Only Memory (EPROM): Similar to PROM but can data can be erased:
        • Ultraviolet EPROM: Data can be erased with a light
        • Electronically EPROM: Deletes by delivering electronic voltages to the pins of the chip to force erasure.
        • Flash Memory: A form of EEPROM but data can be erased and written in blocks/pages versus needing everything deleted.
    • Random Access Memory (RAM): Useful for temporary storage, RAM only contains its information when power is supplied to it. RAM is readable and writable memory.
      • Real Memory: (Main/Primary Memory) Dynamic RAM chips.
      • Cache RAM: Cache is used to speed up access to reusable data from fast memory. There are different Levels of cache memory: L1-L4. The closer the data (on-chip, on the motherboard, near core) the faster the memory access.
      • Dynamic: Uses capacitors to store memory and have to continually be refreshed.
      • Static: Uses a flip-flop, that does not need refreshing only power. Faster than dynamic RAM but more expensive.
    • Registers: Onboard CPU memory that is directly accessible for teh ALU (Arithmetic Logical Unit) when processing instructions or performing calculations. Data must be in the registers for the ALU to access.
    • Secondary Memory: Refers to magnetic, optical, or flash-based media that contain data not immediately available to the CPU. Must be read in by the OS and stored in real memory. Secondary memory can be used to store massive amounts of information.
      • Virtual Memory: Memory that acts as real memory but usually is read from storage on the fly (known as paging).
        *
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Memory Addressing? And what are the different schemes of addressing?

A

Locations in memory the processor know where to access data. The different addressing schemes are:

  • Register Addressing: Each register has a location name for easy tracking.
  • Immediate Addressing: Referring to data in the instruction set given.
  • Direct Addressing: Where the CPU is provided with an actual address of the memory location to access.
  • Indirect Addressing: The actual location of the data isn’t given but the address of another is used to find the data.
  • Base+Offset Addressing: Uses a value stored in one of the registers as the base location from which to begin counting. CPU adds the offset to the base address and finds needed data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is storage and what are the different types?

A

Storage: Devices used to store information that can be retrieved any time after it was written (long-term). This can also be called Secondary memory! This kind of storage is known as non-volatile.

  • Types: CD, DVDs, flash memory cards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between Random v. Sequential storage/access?

A
  • Random: OS can read (and sometimes write) from any point within any point of the device by using an addressing scheme.
  • Sequential: Require that you read/speed-past any data residing before the data you are accessing. Much cheaper solution.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some security concerns for storage?

A
  1. Data may remain on storage devices even after it has been erased (data remanence)
    1. Sanitizing can destroy all traces of data on a device by using software or destroying the unit.
  2. SSD’s often stored backups of data at lower levels which do not get deleted upon wiping the unit.
  3. Physical theft.
    1. Use full disk encryption for this purpose.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some Input and Output Devices that can present a security risk?

A
  • Monitors: There are programs that can read monitors using the radiation they emit (TEMPEST). Also, shoulder surfing.
  • Printers: Sensitive printouts can be taken, also encrypted traffic may not be implemented.
  • Keyboards/Mice: Bugging of these devices can happen (keylogging) and Bluetooth signals can be hijacked.
  • Modems: Can allow outsiders to access the network and put unauthorized access points on the networks among other things. Modems should be not be used.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Firmware?

A

(aka Microcode) Software that is stored in a ROM chip that drives the basic operation of a computing device. There are 2 types of firmware:

  • BIOS (Basic Input/Output System): Comprised of OS-independent primitive instructions that a computer needs to start up and load the operating system from disk. Usually stored on an EEPROM chip to allow for software updates (“flashing the BIOS”).
    • UEFI (Unified Extensible Firmware Interface): A more advanced interface between OS and hardware which maintains support for legacy BIOS.
  • Device Firmware: Many devices need some limited processing power to complete their tasks without taking away from the main OS. So they have these “mini-OS’s” which are entirely contained in firmware chips onboard the devices they serve. Generally, on EEPROM so they can be updated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Client-side Attacks?

A

Client-side Attacks are any attacks that can harm the user, their data, and/or their system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Applets?

A

Applets are code objects that are sent from a server to a client to perform some action. They are self-contained miniature programs that execute independently of the server that sent them.

Benefits:

  • The Processing burden is shifted to the client.
  • The Client is not waiting on a response from the server, and their local response is most of the time faster.
  • More secure for the server as it is not receiving any input from the client.

Downsides:

  • A remote system is sending code to a user’s system in order to execute.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the different types of Applets?

A
  • Java Applets: Java is a platform-independent programming language developed by Sun Microsystems (now owned by Oracle). Most browsers do not support Java anymore. The main benefit of Java is it doesn’t need a specific compiler for each system. It uses the Java Virtual Machine (JVM) which takes the Java code and translates it into a format executable by that specific system. The code can be shared between OS’s without modification.
    • Java applets are simply short Java programs transmitted over the internet to perform operations on a remote system.
    • The Java platform uses a sandbox that executes code in a restricted environment away from other system resources and limited privileges.
  • ActiveX Controls: Developed by Microsoft and similar to Java applets but use a variety of languages including Visual Basic, C, C++, and Java.
    • Can only execute on systems running MS browsers.
    • Not restricted to a sandbox environment, these controls have full access to the environment and can perform a number of privileged actions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are local caches?

A

Anything that is temporarily stored on the client for future reuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of attacks happen on local caches?

A
  • ARP poisoning:
    • Dynamic Cache: ARP cache is updated via a falsified ARP reply. This mapping will stay in place until a timeout occurs (usually within 10 mins).
    • Static Cache: Cache is updated locally with some type of malware.
  • DNS cache poisoning: Client recieves a falsified DNS response and updates its DNS cache.
    • Host File poisoning: HOSTS file is updated with malicious mappings. HOSTS files are generally permanent updates.
    • Authorized DNS server attack: An attack on a local trusted DNS server.
    • caching DNS server attacks: Modifying the IP address of the DNS server on a local machine. Can be done by script or by compromising a DHCP server
    • DNS query spoofing: Sending a malicious reply when a client sends a DNS query out.
  • Internet Files cache: Internet files that are cached for later use are modified maliciously.
    *
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is a Split DNS system?

A

Where an organization has 2 DNS servers, one public and one private.

The public server is available for the public to use and query.

The private is only available to internal, authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Data Flow Control?

A

Data flow is the movement of data between processes, devices, across a network, or over communication channels.

Data Flow Control ensures that receiving systems are not overloaded with traffic, especially to the point of dropping connections or being subject DoS.

Data Flow Control may be provided by network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a Load Balancer?

A

Used to spread or distribute network traffic load across several network links or network devices.

Generally used to spread a load across multiple members of a server farm or cluster.

Techniques:

  • Round Robin
  • Random Choice
  • Load Monitoring
  • Preferencing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Database Security?

A

The protection of the database an org uses because without which business tasks can be interrupted and confidential information can be disclosed.

  • Aggregation: The functions that combine records from one or more tables to produce potentially useful information. These functions need to have restricted access.
  • Inference: Combining several pieces of nonsensitive information to gain access to information that should be classified at a higher level.
  • Data Warehousing: Large databases that store large amounts of information from a variety of databases for use with specialized analysis techniques. These warehouses often contain detailed historical information.
    • Data Dictionary: Commonly used for storing critical information about data, including usage, type, sources, relationships, and formats.
  • Data Mining: Techniques that allow analysts to comb through data warehouses and look for potential correlated information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Metadata?

A

Metadata is data about data or information about data.

Generally stored in a Data Mart which is a more secure container than a normal data warehouse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Data Analytics?

A

The science of raw data examination with the focus of extracting useful information out of the bulk information set such as outliers, summary sets, or important information. Also known as “Big Data”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Big Data?

A

Refers to collections of data that have become so large that traditional means of analysis or processing are ineffective.

There is so much data that dealing with the data: processing, storing, distributing, etc is very difficult.

27
Q

What is a Parallel Data System?

A

Parallel Data Systems (parallel computing) is a computation system designed to perform numerous calculations simultaneously. They often divide up a large task into smaller pieces and distribute it to a smaller subsystem for parallel processing.

These systems utilize use distinct CPU’s, multi-core CPU’s, or virtual systems for the sub-system component.

28
Q

What are the different divisions of Parallel Processing?

A
  • Asymmetric Multiprocessing (AMP): Processors are designed to operate independently from each other and sometimes, are only designed to perform specific tasks (affinity).
    • Massive Parallel Processing (MPP): Where numerous AMP systems are linked together in order to work on a single primary task across multiple processes in multiple linked systems.
  • Symmetric Multiprocessing (SMP): Processors share a common OS and memory and can work collectively on a single task.
29
Q

What is Cloud Computing?

A

Cloud Computing is where processing and storage are performed elsewhere over a network connection rather than locally.

Resources are used on-demand.

30
Q

What is a Hypervisor?

A

A Hypervisor (Virtual Machine Monitor - VMM) is the component of virtualization that creates, manages, and operates the virtual machines.

The computer running the Hypervisor is the Host OS while the OS’s running within the VM are the Guest OS’s.

31
Q

What are the types of Hypervisors?

A
  • Type 1: Native, or bare-metal Hypervisor. No host OS, Hypervisor installs directly on hardware where host OS would reside.
  • Type 2: Standard OS is present on hardware and the Hypervisor is installed as another piece of software. (can be used for host OS’s to be used for sandbox environments)
32
Q

What is Cloud Storage?

A

Using storage provided by a cloud vendor.

33
Q

What is Elasticity?

A

The flexibility of virtualization and cloud solutions to expand or contract as needed.

34
Q

What are the Types of Services provided by the cloud?

A
  • PaaS (Platform as a Service): Providing a computing platform and software solution as a service.
  • SaaS (Software as a Service): On-demand access to specific software applications or suites.
  • IaaS (Infrastructure as a Service): Providing complete virtualized hardware as a service as needed.
35
Q

What types of deployment solutions are available to organizations?

A
  • On-Premise Solution: Where the org owns the hardware, licenses the software and has the systems in the building.
  • Hosted Solution: Where the hardware is owned by the hosting provider and is provided as needed for a subscription-based fee.
  • Cloud Solution: Where the cloud provider owns, operates, and maintains the hardware and software.
36
Q

What are the different types of Cloud Solutions?

A
  • Private: A cloud service within a corporate network and isolated from the internet.
  • Public: Cloud service that is accessible to the general public, typically over the internet.
  • Hybrid: Mixture of private and public cloud.
  • Community: Environment maintained, used, and paid for by a group of users or organizations for their shared benefit.
37
Q

What are Snapshots?

A

Backups of VM’s.

38
Q

What is a CASB?

A

A CASB is a Cloud Access Security Broker. Ensures that proper security measures are implemented between a cloud solution and a customer organization.

39
Q

What is a SECaaS?

A

Security as a Service is where security is provided to an org through an online entity.

40
Q

What is the Cloud Shared Responsibility Model?

A

The division of security and stability responsibility between cloud provider and the customer.

41
Q

What is Grid Computing?

A

A form of parallel processing that groups a significant number of processing nodes to work toward a specific goal. Members of the grid can enter and leave the grid at random intervals when their capacities are not being taxed by local workloads. When a system leaves the grid, it uploads whatever it was working on at the time, finished or unfinished.

Grid computing isn’t necessarily safe since the content of the work packet is exposed for anyone to look at.

42
Q

What is Peer-to-Peer?

A

P2P is where tasks and workloads are shared among peers. Similar to grid computing but there aren’t any central management computers to oversee and track the work.

Lack of central management can lead to some services consuming all available resources. Material being worked on can also be eavesdropped on.

43
Q

What are Smart Devices?

A

A range of mobile devices that offer the user a plethora of customization options and may take advantage of artificial intelligence processing.

44
Q

What is the Internet of Things (IoT)?

A

A class of smart devices that are internet-connected in order to provide automation, remote control, or AI processing in a home or office setting.

45
Q

What are Industry Control Systems (ICS)?

A

A form of computer management device that controls industrial processes and machines.

The different forms are:

  • Distributed Control Systems (DCSs): Used in an environment where control of industrial systems from a central location and the need to gather data is essential.
  • Programmable Logic Controllers (PLCs): Single-purpose of focused-purpose digital computers.
  • Supervisory Control and Data Acquisition (SCADA): Designed with minimal human interface, generally have mechanical buttons, knobs, or simple LCD screens.
46
Q

What is OWASP?

A

OWASP (Open Web Application Security Project) is a nonprofit security project focusing on improving security for online or web-based applications.

47
Q

What are some important components to evaluate in a Security Evaluation?

A
  • Recon and Info Gathering
  • Check configuration (file handling/extensions)
  • Transmission Security (SSL/TLS)
  • Authentication
  • Session Management
  • Cryptography
  • Data Validation and Sanitization
48
Q

What is an Injection Attack?

A

Any exploitation that allows an attacker to submit code to a target system in order to modify its operations and/or poison and corrupt its data set.

  • SQL Injection: Allows individuals to perform SQL transactions directly against the underlying database sometimes bypassing authentication, revealing confidential information, change data, and add new records.
  • LDAP Injection
  • XML injection
  • HTML injection
  • SAML injection
49
Q

How can you protect against (SQL) Injection attacks?

A
  • Input Validation
  • Limit Account Privileges
  • Defensive coding
50
Q

What is Cross-Site Scripting (XSS)?

A

XSS is where an attacker is able to compromise a web server and inject their own malicious code into the content sent to other visitors.

Defenses include:

  • Update to date patching
  • Input Validation
  • Use of WAF
  • Use of HIDS
51
Q

What is Cross-site Request Forgery (XSRF)?

A

Tricking the user’s browser into performing actions they did not intend such as:

  • forging requests
  • logging out of a session
  • uploading a site cookie
  • changing acct info
  • making a purchase
  • downloading acct details

Prevention includes:

  • 2FA
  • Re-enter PW
  • CAPTCHA
  • adding nonce to URL
52
Q

What are some methods to secure mobile devices?

A
  • Full Device Encryption
  • Remote Wiping
  • Lockout
  • Screen Locks
  • GPS
  • App Control (Limits the apps installed)
  • Storage Segmentation
  • Asset Tracking
  • Inventory Tracking (using the device to track other items)
  • Mobile Device Management (MDM)
  • Device Access Control
  • Removable Storage
  • Disabling Unused Features
    *
53
Q

What are some methods to secure applications on mobile devices?

A
  • Key Management
  • Credential Management: Storage of creds in a central location
  • Authentication
  • Geotagging: Embedding of geographical data into a photo.
  • Encryption
  • Application Whitelisting: Prohibits unauthorized software from being able to execute unless it’s on a pre-approved whitelist
    *
54
Q

What are some BYOD Alternatives?

A
  • COPE (Company Owned Personally Enabled): Org purchases devices and provides them to employees.
  • CYOD (Choose Your Own Device): Provides users with a list of pre-approved devices. (Company can purchase or Employee can)
  • VDI (Virtual Desktop Infrastructure): Hosting virtual machines on central servers that are remotely accessed by users.
    • VMI (Virtual Mobile Infrastructure): The OS of a mobile device is virtualized on a central server.
55
Q

What are some BYOD concerns?

A
  • Data Ownership: Who owns what data and is that data separately stored and backed up
  • Support Ownership: Who is responsible for the support of device
  • Patch Management: Who is responsible for keeping the software up to date and how is it done?
  • Antivirus Management: If/what AV apps are installed
  • Forensics: What investigation will take place in the event of an issue.
  • Privacy: Will tracking and monitoring be taking place and how much.
  • On-boarding/Off-boarding: How are devices onboarded and offboarded for employees
  • Adherence to Corporate Policies
  • User Acceptance: Needs user consent and acceptance
  • Architecture/Infrastructure Considerations: IP assignments, bandwidth, data management, etc,
  • Legal Concerns
  • Acceptable Use Policy
  • On-board Camera/Video
56
Q

What are Embedded Devices?

A

A computer that is implemented as part of a larger system. Usually designed to do a limited set of functions. It could be a computer system or it could be a microcontroller.

57
Q

What are Static Systems?

A

A set of conditions or environments that remain unchanged. Usually set up for a specific need.

58
Q

What are some examples of Embedded/Static Systems?

A
  • Cyber-Physical Systems (robotics and sensor networks)
    • IoT
  • Mainframes
  • Gaming Consoles
  • In-Vehicle Computer Systems
59
Q

What are some Methods of Securing Embedded/Static Systems?

A
  • Network Segmentation
  • Security Layers: Devices with different levels of classification are grouped together and isolated.
  • Application Firewalls: A strict set of communication rules for a service and all users.
  • Manual Updates: Properly test any changes that will be implemented.
  • Firmware Version Control
  • Wrappers: Used to enclose or contain something else.
  • Monitoring
  • Control Redundancy and Diversity: Having many security controls in place instead of relying on just one.
60
Q

What are some technical protection mechanisms such as Layering, Abstraction, and Data Hiding?

A
  • Layering: different levels of sensitivity run separately on different levels
  • Abstraction: Users of an object don’t need to know the details. Also uses classes that have different levels of access
  • Data Hiding: Data existing at one level isn’t visible at another level.
  • Process Isolation
  • Hardware Segmentation
61
Q

What are some Policy permission principles?

A
  • Principle of Least Privilege
  • Separation of Privilege
  • Accountability
62
Q

What are some common architecture security flaws?

A
  • Covert Channels: Used to pass the info over a path that is not normally used.
    • Timing Channel: Conveys info by altering the performance of a system component in a predictable manner.
    • Storage Channel: Conveys info by writing info to a storage area where another process can read it.
  • Design or Coding Flaws
  • Trusted Recovery: Where all security controls remain intact in the event of an attack.
  • Input and Parameter Checking: Validating data that is input into a system.
  • Maintenance Hooks: Entry points in a system that only a developer knows
  • Privileged Programs: Programs with elevated permissions
  • Incremental Attacks: attacks that occur in slow, gradual increments.
    • Data Diddling: Attacker gains access and makes small, random, or incremental changes.
    • Salami Attack: Systematic whittling at financial records (taking thin slices of salami)
  • Programming
  • Timing, State Changes, and Communication Disconnects
    • Time of Check: Subject checks status of object
    • Time of Use: when a subject accesses an object
    • Time of Check to Time of Use (TOCTTOU): Attacker is racing with legit process to replace the object before it is used.
  • Electromagnetic Radiation: Electronic components emit radiation in the course of their operation. The radiation waves can be monitored and certain data can be deduced from the waves. You can reduce signal strength and increase physical security around equipment to prevent access to the EM waves.
63
Q

What is a Faraday Cage?

A

A special enclosure that acts as an EM capacitor, no EM signals can enter or leave the enclosed area.