Ch9 Flashcards
capable at operating at one security level at a time
single state processor
can simultaneously operate at multiple security levels
multistate processor
security modes approved by Federal government for processing classified information
Dedicated - all users have clearance, access permissions & need-to-know
System High - all users have clearance & access permissions
Compartmented - all users have clearance
Multilevel
what systems often go far beyond basic
multiprocessing capabilities. They often include the concept of dividing up a large task into smaller elements, and then distributing each subelement to a different processing subsystem
parallel systems
what are built out of a large number of capacitors, each holding a single electrical charge. They are continuously refreshed by the CPU in order to retain their contents
Dynamic RAM chips
what types of chips BIOS and Firmware stored on
EEPROM
what code objects are sent from a server to a client to perform some action
applet
what applets have full access to the Windows operating system
ActiveX
an attack responding to ARP broadcast queries in
order to send back falsified replies or static ARP entry
ARP cache poisoning
collect numerous lowlevel security items or low-value items and combine them to create something of a higher security level or value.
aggregation
combining several pieces of nonsensitive information to gain access to information that should be classified at a higher level by using the deductive capacity of the human mind
inference
a way of referring to data that is supplied to the CPU as part of an instruction
immediate addressing
CPU is provided with an actual address of the
memory location to access. The address must be located on the same memory page as the instruction being executed
direct addressing
memory address supplied to the CPU as part of the instruction doesn’t contain the actual value that the CPU is to use as an operand. Instead, the memory address contains another memory address (perhaps located on a different page).
indirect addressing
a value stored in one of the CPU’s registers as the base location from which to begin counting
Base+Offset Addressing
what are the 3 main security issues surrounding memory components
- data may remain on chip after power is lost
- memory chips are highly stealable (pilferable)
- control of access is low in multiuser system
what are security risks that input/output devices can pose
eavesdropping
tapping
to smuggle data out of organization
to create unauthorized points of entry
what is the biggest security risks from monitors
TEMPEST; shoulder surfing or telephoto lenses on cameras
what is the biggest security risks from keyboards
TEMPEST; keystroke monitoring
what is the biggest security risks from printers
printouts left on printers
unsecure HDDs
what is the biggest security risks from modems
- allow inbound access around perimeter security
- allow egress of data
a technique for assigning specifc signal lines to specifc devices through a special interrupt controller
Interrupt Request (IRQ)
works as a channel with two signal lines, where one line is a DMA request (DMQ) line and the other is a DMA acknowledgment (DACK) line. Devices that can exchange data directly with memory and without requiring assistance from the CPU
Direct Memory Access - used most commonly to permit disk drives, optical drives, display cards, and multimedia cards to manage large-scale data transfers to and from real memory.
From a security standpoint, what should be the only thing managing the DMA, IRQ and Memory Mapped I/O
operating system
a technique used to provide access to some kind of device through a series of mapped memory addresses or locations
Memory-Mapped I/O
true or false: Abstraction creates “Black Box” interfaces for programmers to use without the knowledge of algorithm or inner workings
true
creates different realms of security within process and limits communication between them
layering
prevents information from being read from different security level
data hiding
enforces process isolation with physical controls
hardware segmentation
The role of a ______ ______ is to inform and guide the design, development, implementation, testing and maintenance of some particular system.
security policy
Name PED security features
- full device encryption
- remote wipe
- lockout
- screen lock
- GPS
- application control
- storage segmentation
- asset tracking
- inventory control
- mobile device management
- device access control
- removable storage
- disabling of unused features
- the concept that if A trusts B and B trusts C, then A inherits trust of C
- serious security concern because it may enable bypassing of restrictions or limitations
Transitive Trust