Chapter 12: Security Architecture Vulnerabilities, Threats, and Countermeasures Flashcards
What is multitasking?
Handling two or more tasks simultaneously (or time slicing to appear so)
What is multiprocessing?
Harnessing the power of more than one processor to complete the execution of a single application.
What is symmetric multiprocessing?
A single computer/operating system controlled by one OS, sharing data and memory resources.
What is massively parallel processing?
Each processor has its own operating system and memory bus/resources.
What is multiprogramming?
The pseudosimultaneous execution of two tasks on a single processor coordinated by the operating system as a way to increase operational efficiency.
What is multithreading?
Multiple concurrent tasks performed within a single process.
What are the ways in which processing information of different security levels has been addressed?
Single state and multistate systems. Single state systems use policy mechanisms, requiring approval of a system to process only a single security level at a time. Multistate systems are certified to handle multiple levels simultaneously using protection mechanisms.
Multistate systems are uncommon because they’re expensive.
What is in protection ring 0?
OS kernel/memory resident components
What is in protection ring 1?
Other OS components
What is in protection ring 2?
Drivers, protocols, etc
What is in protection ring 3?
User level programs and applications.
What is a process state?
The various forms of execution in which a process may exist. Supervisor mode == privileged, all access. Problem mode = user mode, all access requests must be checked.
What are the four approved security modes for systems that process classified information?
Dedicated, system-high, compartmented, multilevel
Describe dedicated mode
.
Describe system-high mode
.
Describe compartmented mode
.
Describe multilevel mode.
.
Security mode table
.
What is the primary advantage of ROM?
It can’t be modified.
What is PROM?
Programmable Read Only Memory. A user can write it once.
What is EPROM?
Erasable PROM. Has a small window that when illuminated with UV light erases the chip. Reusable.
What is EEPROM?
Electronically erasible PROM. Doesn’t require the UV light. Some BIOS are this.
What should you do with any memory devices prior to allowing them to leave?
Purge them. Includes memory.
What is the difference between primary vs secondary storage?
Primary is RAM. Secondary is all the familiar long term storage devices, like hard drives.
What is DMA?
Direct memory access. More detail. p 500.
What is RAID 0?
Striping
What is RAID 1?
Mirroring
What is RAID 2
Hamming code parity
What is RAID 3?
Byte-level parity
What is RAID 4?
Block level parity
What is RAID 5?
Interleave parity
What is RAID 6?
Second parity data
What is RAID 10?
Raid 1 + RAID 0
What is RAID 15?
RAID 1 + RAID 5
What is an applet?
A code object sent from a server to be run on the client.
What is cloud computing?
A concept of computing where processing and storage are performed elsewhere over a network connection rather than locally.
What are the security issues with cloud computing?
Privacy concerns, regulation compliance difficulties, use of open/closed-source solutions, adoption of open standards, and whether cloud-based data is secured (or even securable).
What is Paas?
Platform as a service. Hardware and OS.
What is SaaS.
Provides on-demand access to specific software applications or suites without the need for local installation. Office 365, for example.
What is IaaS?
Infrastructure as a service. Utility or metered computing. Administrative task automation, dynamic scaling and virtualization.
What is Grid Computing?
A form of parallel distributed processing that loosely groups a significant number of processing nodes to work toward a specific processing goal. members of the grid can enter or leave. Partial calculations, state saving.
Describe Peer to Peer (P2P) computing.
Like grid, but no central management. Skype, Bittorrent, Spotify.
Perceived inducement to copyright infringement, ability to eavesdrop, ability for services to consume all bandwidth.
Finish page 510
.