Chapter 1 Flashcards
Operational security of software-intensive systems depends on the practices and techniques during their
design and development
Lifecycle processes must consider the _______ inherent in the operational environments where systems are deployed
security- related
Increased consideration of operational security earlier in the acquisition and development process provides an opportunity to _____________
tone decisions to address security risk and reduce the total cost of operational security
SCADA stands for
supervisory control and data acquisition
Much of the information protection in place today is based on the principles established by _______
Saltzer and Schroeder
Where and when did Saltzer and Schroeder’s publication appear?
1974, Communications of the ACM
What was the title of Saltzer and Schroeder’s influential paper?
“The Protection of Information in Computer Systems”
What did Saltzer and Schroeder define as security?
“Techniques that control who may use or modify the computer or the information contained in it.”
What are the three main categories of security concern?
Confidentiality, integrity, availability
Name some examples of security problems
Malware, viruses, XSS, SQL Injection
Those working with deployed systems refer to their enhanced security needs as _____
Cyber Security Assurance
Software assurance as a term usually refers to the areas of ______
acquisition and development
What is the NASA definition of software assurance?
“The planned and systematic set of activities that ensure that software lifecycle processes and products conform to requirements, standards, and procedures.”
What ISO standards are a good reference for software assurance topics?
ISO/IEC 2008a, 2008b, 2009, 2011, 2015
What do definitions of software assurance usually include?
The requirement that software functions as intended.
What’s one reason for the different approaches suggested by the existing definitions of software assurance?
Risks related to modern systems of systems
What are some other challenges to effective operational security?
The increased use of commercial off-the-shelf (COTS) and open-source software as components within a system
Sustainment is
maintaining a deployed system over time as technology and operational needs change
Ignoring the issues surrounding sustainment can _______
undermine the stability, security and longevity of systems in production
Economy of mechanism
Keep the design as simple and small as possible
Fail-safe defaults
base access decisions on permission rather than exclusion
complete mediation
every access to every object must be checked for authority
open design
the design should not be secret. the mechanisms should not depend on the ignorance of the potential attackers, rather on the possession of specific and more easily protected keys and passwords
separation of privilege
where feasible, a protection mechanism that requires 2 keys to unlock is more robust and flexible than one that allows access to the presenter of only a single key