CH 4 Host Security Flashcards

1
Q

Access Control List (ACL)

A

..Work from the top down

. Implicit deny clause at the end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Host-based firewalls

A

.Adds defense-in-depth by creating another layer of controls

.Inspects and controls inbound and outbound traffic from host where installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Persistent Agents

A

.Always on.

.Performs compliance and authentication before allow system to have network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Non-persistent agents

A

.Do not run continuously.

.Check the systems and terminate the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trusted Operation System

A

.One that has implemented sufficient controls to support multilevel security
.Can handle information at different security levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common Criteria

A

. Examines different areas (physical, logical) of the trusted OS to establish an evaluation assurance level (EAL).

EAL 0: Inadequate assurance
EAL 1: Functionally tested
EAL 2: Structurally tested
EAL 3: Methodically checked and tested
EAL 4: Methodically designed, tested and reviewed
EAL 5: Semi-formally designed and tested
EAL 6: Semi-formally verified, designed, and tested
EAL 7: Formally verified, designed and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trusted OS Basic Attributes

A

. Hardware protection - secure HW
. Long-term storage protection - storage protection that lasts across power cycles and other events
. Isolation - Able to isolate programs
. Separation of User Processes from Supervisor Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trusted Computer Base

A

.The sum of all the protections mechanisms withing a computer
. Is responsible for enforcing computer policies
. HW, SW, controls process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bell-LaPadula Security Model

A

. Confidentiality is the primary focus
. Subject must clear and meet or exceed the information classification level
> Simple Security
. NO READ UP - not allow to read information at a higher classification level

> Star
. NO WRITE DOWN - a subject at one information level is not allows to write information to a lower level of confidentiality

> Strong Star Security - subject cannot write up or read down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Biba Security Model

A

. Integrity is the primary focus
> Simple Integrity
. NO READ DOWN - subject at one level of integrity is not permitted to read as object of lower integrity

> Start Integrity - an object at one level of integrity is not permitted to write to an object of higher integrity.

> Invocation - prohibits a subject at one level from invoking a subject at a higher level of integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Clark - Wilson Security Model

A

. Capability-based security

. Data can only be manipulated in a way that protects consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Brewer- Nash

A

.Chinese wall
.Designed to prevent conflicts of interest.
Subject working one one side of the wall cannot see data on the other side of the wall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Clearances

A

Government: Top Secret - Secret - Unclassified

Private: Restricted - Private - Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Least Functionality Control

A

Organization configures the IS to provide only essential capabilities and specifically prohibits and /or restricts the use of these functions to certain users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Incremental Attacks

A

. Goal is to make changes slowly over a long period of time in hopes of remaining undetected.
> Data Diddling- small changes to databases

> Salami Attack - small changes to financial records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Heuristic

A

behavior

17
Q

Multipartite Infectors

A

Target both boot records and programs

18
Q

Polymorphic viruses

A

.Change their signature every time they replicate and infect a new file.

. Makes it much harder for AV to detect the virus.

19
Q

Host hardening

A

Series of steps carried out to remove unwanted services and features for the purpose of making it harder for an attacker to attack a computer successfully

20
Q

Warning banners

A

Crucial in that they warn the user about specific activity or behavior that may or may not be allowed.

21
Q

IDS/ IPS Types

A
.Signature Recognition
.Anomaly detection
.Protocol decoding - 
 >Uses models based on the TCP/IP stack
 >Has the ability to reassemble packets to look for high-level activity.
22
Q

Command shell restrictions

A

Restricting users access to the command prompt in order to tighten security.