Chapter 3 Flashcards

1
Q

Systems engineering activities intended to deter and/or delay exploitation of critical technologies in a system in order to impede countermeasure development, unintended technology transfer, or alteration of a system.

A

Anti-tamper (AT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A chronological record of system activities, which includes records of system accesses and operations performed in a given period.

A

Audit Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An individual entry in an audit log related to an audited event.

A

Audit Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A chronological record that reconstructs and examines the sequence of activities surrounding or leading to a specific operation, procedure, or event in a security-relevant transaction from inception to final result.

A

Audit Trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A record showing who has accessed an information technology (IT) system and what operations the user has performed during a given period.

A

Audit Trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To confirm the identity of an entity when that identity is presented.

A

Authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security measure designed to protect a communication system against acceptance of fraudulent transmission or simulation by establishing the validity of a transmission, message, originator, or a means of verifying an individual’s eligibility to receive specific categories of information.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A copy of files and programs made to facilitate recovery, if necessary.

A

Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A software and/or hardware product that is commercially ready-made and available for sale, lease, or license to the general public.

A

Commercial-off-the-shelf (COTS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Establishment of and charter for a group of qualified people with responsibility for the process of controlling and approving changes throughout the development and operational lifecycle of products and systems; may also be referred to as a change control board.

A

Configuration Control Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An aggregation of information system components that is designated for configuration management and treated as a single entity in the configuration management process.

A

Configuration Item

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Item or aggregation of hardware, software, or both, which is designated for configuration management and treated as a single entity in the configuration management process.

A

Configuration Item

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A collection of activities focused on establishing and maintaining the integrity of information technology products and information systems, through control of processes for initializing, changing, and monitoring the configurations of those products and systems throughout the system development life cycle.

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The set of parameters that can be changed in hardware, software, or firmware that affect the security posture and/or functionality of the information system.

A

Configuration Settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Management policy and procedures used to guide an enterprise response to a perceived loss of mission capability.

A

Contingency Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Information security strategy integrating people, technology, and operation capabilities to establish variable barriers across multiple layers and missions of the organization.

A

Defense-in-depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The cryptographic transformation of data to produce ciphertext.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Communications encryption in which data is encrypted when being passed through a network, but routing information remains visible.

A

End-to-end Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Safeguarding information in an information system from point of origin to point of destination.

A

End-to-end Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function.

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A determination within the executive branch in accordance with directives issued pursuant to this order that a prospective recipient requires access to a specific classified information in order to perform or assist in a lawful and authorized governmental function.

A

Need-to-know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Protection against an individual falsely denying having performed a particular action.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Provides the capability to determine whether a given individual took a particular action such as creating information, sending a message, approving information, and receiving a message.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A security-focused description of an information system, its operational policies, classes of users, interactions between the system and its users, and the system’s contribution to the operational mission.

A

Security Concept of Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A suite of specifications that standardize the format and nomenclature by which software flaw and security configuration information is communicated, both to machines and humans.

A

Security Content Automation Protocol (SCAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An occurrence (e.g., and auditable event or flag) considered to have potential security implications to the system or its environment that may require further action (such as noting, investigating, or reacting).

A

Security-relevant Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Based on Department of Defense policy and security controls, an implementation guide geared to a specific product and version.

A

Security Technical Implementation Guide (STIG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Contains all requirements that have been flagged as applicable for the product which have been selected on a DoD baseline.

A

Security Technical Implementation Guide (STIG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Always keep the problem and solution spaces separate.

A

Security Engineering Principle to Avoid Inefficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The problem space is defined by the customer’s mission or business needs.

A

Security Engineering Principle to Avoid Inefficiency

32
Q

The systems engineer and information systems security engineer define the solution space, driven by the problem space.

A

Security Engineering Principle to Avoid Inefficiency

33
Q

Review web pages, operational procedures and documents, annual reports, and CONOPS and mission needs statement (MNS).

A

ISSE Methods for Analyzing Organizational and Operational Environments

34
Q

Includes: (i) stakeholder perspective, (ii) system perspective, and (iii) trades perspective.

A

Protection Needs Perspectives

35
Q

Focuses on what is of value to the stakeholder.

A

Stakeholder Perspective

36
Q

Based on those assets that are deemed necessary for the system to execute correctly and securely to manage its execution, and to provide for its own protection.

A

System Perspective

37
Q

Considers protection need aspects associated with all feasible alternatives, as well as those related to a specific decision.

A

Trades Perspective

38
Q

Specify security capability, performance, effectiveness, and the associated verification and validation measures, and also express constraints on system requirements.

A

Security Requirements

39
Q

Describe the stakeholder-oriented view of desired capability; include operational, protection, safety, and other needs and expectations of stakeholders, including legal, policy, regulatory, statutory, certification, policy, and other constraints for solutions that support the mission or business.

A

Stakeholder Requirements

40
Q

Intended to achieve adequate security and help the system meet security objectives set forth for the system.

A

Design Constraints

41
Q

Allows the team to move forward in the systems engineering process and continue with requirements; must be validated before the design is finalized.

A

Design Assumption

42
Q

Develop an understanding of the customer’s mission or business.

A

Determine System Protection Needs Task

43
Q

Help the customer determine what information management is needed to support the mission or business.

A

Determine System Protection Needs Task

44
Q

Create a model of that information management, with customer concurrence.

A

Determine System Protection Needs Task

45
Q

Document the results as the basis for defining information systems that will satisfy the customer’s needs.

A

Determine System Protection Needs Task

46
Q

Contains information types often aggregated together into information domains, and these domains contain the following elements: (i) users or members of the information domain; (ii) rules, privileges, roles, and responsibilities that apply to the users in managing all the information; (iii) and information objects being managed, including processes.

A

Information Management Model (IMM)

47
Q

Formal documents that cover the official plan for testing a system, subsystem, or component.

A

Security Test Plan (STP)

48
Q

References the “objective” or “requirement” to be met, the assessment method, and the “object” to be tested.

A

Security Test Plan (STP)

49
Q

Executed by a security control assessor (SCA); should be an independent third party.

A

Security Test Plan (STP)

50
Q

Includes: (i) security architecture and design, (ii) security capability and intrinsic behaviors, and (iii) life cycle security.

A

Security Design Principles

51
Q

Application of these principles is intended to permit a demonstration of system trustworthiness through assurance based on reasoning about relevant and credible evidence.

A

Security Design Principles

52
Q

Describes the layers of security mechanisms and security architectures that delay, prevent, or deter attacks against the system.

A

Defense in Depth

53
Q

Involves policies and procedures, training and awareness, physical security, personnel security, system security administration, and facilities countermeasures.

A

People

54
Q

Involves information assurance, architecture framework areas, IA criteria such as security, PKI, acquisition integration of evaluated products, and system risk assessments.

A

Technology

55
Q

Principles are centered around people, technology, and operations.

A

Defense in Depth Principles

56
Q

Involves security policy, assessment and authorization, readiness assessments, security management, key management, attack sensing and warning response, and recovery and reconstitution.

A

Operations

57
Q

Includes: (i) passive, (ii) active, (iii) close-in, (iv) insider, and (v) distribution.

A

Classes of Attacks

58
Q

Include traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and capture of authentication information.

A

Passive Attack

59
Q

Can give adversaries indications and warnings of impending actions.

A

Passive Attack

60
Q

Can result in disclosure of information or data files to an attacker without the consent or knowledge of the user.

A

Passive Attack

61
Q

Consists of a regular type individual’s attaining close physical proximity to networks, systems, or facilities for the purpose of modifying, gathering, or denying access to information.

A

Close-in Attack

62
Q

Can be malicious or non-malicious; malicious result from intentional acts and non-malicious result from carelessness, lack of knowledge, or intentional circumvention.

A

Insider Attack

63
Q

Focus on the malicious modification of hardware or software at the factory or during distribution.

A

Distribution Attack

64
Q

Include attempts to circumvent or break protection features, introduce malicious code, or steal or modify information.

A

Active Attack

65
Q

The concept that should a system fail, it fails in a safe state (e.g., anti-tamper encryption measures).

A

Fail-safe Default

66
Q

Occur when a network converges to a single point.

A

Single Point of Failure (SPoF)

67
Q

Tasks include: (i) define the system boundaries and interfaces, (ii) document security allocations to the target system and external systems, and (iii) identify data flows between the target system and external systems and the protection needs associated with those data flows.

A

Define System Security Requirements

68
Q

A high-level diagram in which the boundary of the entire system and the composite protection needs for the target system are reflected.

A

Initial System Security Context Diagram

69
Q

Describes how the system will work, including connectivity and information flows through the systems and remote sites.

A

Security CONOPS

70
Q

Covers all of the functionality, missions, or business needs and addresses the inherent risk in operating the system.

A

Security CONOPS

71
Q

Should be clear, concise, and verifiable.

A

System Security Requirements

72
Q

Allows a better understanding of what the system has to do; the ways in which it can do it; and to some extent, the priorities and conflicts associated with lower-level functions. It provides information essential to optimizing physical solutions.

A

Functional Analysis and Allocation

73
Q

Includes: (i) functional flow block diagram, (ii) timeline analysis, and (iii) requirements allocation sheet.

A

Functional Analysis Key Tools

74
Q

A system engineering document that shows the flow of data between functions and the decisions made by the system.

A

Functional Flow Block Diagram

75
Q

Informs the team of the duration of various functions over time.

A

Timeline Analysis Sheet (TLS)

76
Q

Traces functions to the associated detailed specifications; includes: (i) function name, (ii) functional performance and design requirements, and (iii) configuration items.

A

Requirements Allocation Sheet (RAS) / Requirements Matrix

77
Q

Ensure compliance with a security architecture, design constraints, perform trad-off studies, and define system security design elements.

A

Develop System Security Design Components Tasks