Architectural Risk Analysis & Distrustful Decomposition Flashcards
1
Q
Threat Modeling – General Approach
A
- Determine threats
- Rate threats
- Determine countermeasures
2
Q
Data Flow Diagram Primitives
A
External Interactors
Process
Datastore
Data Flow
3
Q
External Entity
A
S
R
I
D
4
Q
Process
A
S
T
R
I
D
E
5
Q
Data Store
A
T
R
I
D
6
Q
Data Flow
A
T
I
D
7
Q
Distrustful Decomposition Key Principles
A
- Decompose the system into separate processes with separate permissions
- Communicate via inter-process communication
- Each operating-system process distrusts the other
8
Q
IPC
A
Inter Process Communication
9
Q
IPC Basic Techniques
A
Files
Signals
Clipboard
10
Q
IPC Advanced Techniques
A
Pipes (A.K.A. FIFO Buffer)
Sockets
11
Q
A