arch Flashcards

1
Q

Control Unit

A

Control Unit

Fetches code, interprets code, oversees exe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trusted Computing Base

A

Trusted Computing Base (TCB)

consists of sw, hw, fw, and processes wi a comp that are designed to enfore a sec pol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common Criteria

A

Common Criteria

works to answer 2 basic Qs: What sec mech wi the product do? How sure of it are you?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certifications

A

Certifications

technial review of prod that ensure sec req have been met.Certs are preformed 1st and then Accrediations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Invocation prop

A

Invocation property

part of biba security model and enforces integrity btw subj and obj

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

*-property rule

A

Part of Bell-Lapadula model and enforces confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Simple security role

A

a subject cannot read data within object that resides in a higher security level. “No read up “rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Strong star property rule

A

For a subject to be able to read and write to an object the subjects clearance any objects classification must be equal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

orange book/ TCSEC levels

A

A. verified protection
B. Mandatory
C: Discretionary
D: minimal

B2 offers more assurance then B1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ITSEC (euro) has 2 grades:
F1-F10 = functional
E0-E6 = assurance

0 being worst.

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Common criteria is the evaluation identified by ISO and 93 that outlines any merges all of their evaluation criteria such as TCsec and ITsec and CTCPEC

A

Eval1- Eval7.

7 bring best and formally verified design and tested

1: Functionally tested
2: Structurally tested
3: Methodically we tested and checked
4: Methodically designed tested and reviewed
5: Semi formally designed and tested
6: semi formally verified design and tested
7: Formally verified design and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which security model dictate that subjects can only access objects your application. This model also illustrates how to provide functionality for separation duties and requires auditing tasks within software

A

The Clark – Wilson model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which security model is used mainly military and government oriented systems

A

The bell– LaPadula model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which security models are used in the commercial sector

A

The Biba and Clark – Wilson model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the deal with C-language and buffer overflow attacks

A

The ceiling which is susceptible to buffer overflow attacks because it allows for direct pointer manipulations to take place. Specific commands can provide access to low-level memory addresses without carrying bounds checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Memory address to address bus relationship

A

a processor sends a memory address and a “read “request down an address bus. The system reads data from the memory address and puts the requested data on the data bus. A CPU uses a program counter to keep track of the memory addresses containing the instruction sets it needs to process and sequence. A stack pointer is a component used within memory that communication processes. an I/O bus is used by a peripheral device

17
Q

International std that outlines sys arch frameworks and arch Lang.

A

ISO/IEC 42010:2007

18
Q

international std used as basis for evalu of sec properties of products under common criteria frameworks.

A

ISO/IEC 15408

19
Q

Security kernel

A

The security kernel is a portion of the OS kernel and enforces the rules outlined in the reference monitor. It is the enforcer of the roles and it’s invoked each time a subject makes a request to access an object

20
Q

which risk mgmt std deals w financial, capital and human safety ALONG with risk mgmt for info sec??

A

AS/NZ 4360.