Chapter 9 - Client And Application Securiity Flashcards
BIOS (Basic Input/Output System)
Firmware that wakens and tests the various components of the computer upon startup.
UEFI (Unified Extensible Firmware Interface)
A newer mechanism that replaces the BIOS for startup.
Secure boot
A standard designed to be used with UEFI to ensure that a computer boots using only software that is trusted by the computer manufacturer.
Hardware root of trust
The hardware starting point in a chain of trust.
Electromagnetic spying
Picking up on the electromagnetic fields that digital devices produce and reading the data that is producing them.
Telecommunications Electronics Material Protected from Emanating Spurious Transmissions (TEMPEST)
A classified standard intended to prevent attackers from picking up electromagnetic fields from government buildings.
Supply chain
A network that moves a product from the supplier to the customer.
Least functionality
A principle in which a user is given the minimum set of permissions required to perform necessary tasks.
Application whitelisting/blacklisting
Creating a list of applications that are permitted (whitelisting) or denied (blacklisting) to run.
Patch
A publicly released software security update intended to repair a vulnerability.
Antivirus (AV)
Software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus.
Trusted OS
An operating system that has been designed through OS hardening.
Deadbolt lock
A door lock that extends a solid metal bar into the door frame for extra security.
Key management
Procedures to regulate the distribution of door keys.
Access logs
A paper or electronic record of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area.
Mantrap
A device that monitors and controls two interlocking doors to a small room, designed to separate secure and nonsecure areas.
Protected distribution system (PDS)
A system of cable conduits that is used to protect classified information being transmitted between two secure areas.
Memory leak
A vulnerability that occurs when an application dynamically allocates memory but does not free that memory when finished using it.
Pointer deference
A pointer with a value of NULL used as if it pointed to a valid memory area.
DLL injection
An attack that inserts code into a running process through a Dynamic Link Library.
Development stage
A stage of application development in which the requirements for the application are established and it is confirmed that the application meets the intended business needs before the actual coding begins.