Architectural Risk Analysis & Distrustful Decomposition Flashcards

1
Q

Threat Modeling – General Approach

A
  • Determine threats
  • Rate threats
  • Determine countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Flow Diagram Primitives

A

External Interactors
Process
Datastore
Data Flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

External Entity

A

S
R
I
D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Process

A

S
T
R
I
D
E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Store

A

T
R
I
D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Flow

A

T
I
D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Distrustful Decomposition Key Principles

A
  • Decompose the system into separate processes with separate permissions
  • Communicate via inter-process communication
  • Each operating-system process distrusts the other
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IPC

A

Inter Process Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPC Basic Techniques

A

Files
Signals
Clipboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPC Advanced Techniques

A

Pipes (A.K.A. FIFO Buffer)
Sockets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly