Chapter 9: Security Architectures Flashcards

1
Q

Threat modeling

A

process of describing probable adverse effects on our assets caused by specific threat sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

attack tree

A

a graph showing how individual actions by attackers can be chained together to achieve their goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

STRIDE

A

threat modeling framework developed by Microsoft that evaluates a system’s design using flow diagrams, system entities, and event related to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lockheed Martin Cyber Kill Chain

A

identifies seven stages of cyberattacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MITRE ATT&CK framework

A

a comprehensive matrix of tactics and techniques used to model cyberattacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Defense in depth

A

the coordinated use of multiple security controls in a layered approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Zero trust

A

a model in which every entity is considered hostile until proven otherwise, and even that trust is limited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trust but verify

A

the principle that, even when an entity and its behaviors are trusted, we should double-check both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shared responsbility

A

a service provider is responsible for certain security controls, while the customer is responsible for others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Separation of duties

A

divides important functions among multiple individuals to ensure that one person has the ability to intentionally or accidentally cause serious losses to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Least privilege

A

people are granted exactly the access and authority they require to do their jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

need-to-know principle

A

similar to the least-privilege principle, based on the concept that individuals should be given access only to the information they absolutely require in order to perform their job duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

“keep it simple” principle

A

check we are not adding unnecessary complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

principle of secure defaults

A

every system starts off in a state where security trumps user friendliness and functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

principle of failing securely

A

in the event of an error, systems designed to behave in a predictable and noncompromising manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

principle of privacy by design

A

to ensure privacy of user data, incorporate data protection as an integral part of the design of a system; not as an afterthought or later-stage feature

17
Q

Bell-LaPadula model

A

enforces the confidentiality aspects of access control

18
Q

Biba model

A

security model addresses the integrity of data within a system but not concerned with security levels and confidentiality

19
Q

Brewer and Nash model

A

Chinese Wall model; subject can write to an object if, and only if, the subject cannot read another object that is in a different dataset

20
Q

TPM

A

Trusted Platform Module; carries out security functions: storage of cryptographic keys and digital certificates, symmetric and asymmetric encryption, and hashing

21
Q

HSM

A

hardware security module

22
Q

hardware security module

A

removable expansion card or external device to generate, store, and manage cryptographic keys to improve encryption/decryption performance of the system into it is installed

23
Q

SED

A

self-encrypting drive; provides FDE through cryptographic module integrated with the storage media into one package

24
Q

FDE

A

full disk encryption

25
Q

Data in SEDs encrypted using … key cryptography

A

symmetric key

26
Q

Bus encryption systems

A

use TPMs to encrypt data and prior to being put on the internal bus, so they are also encrypted everywhere else except when data is being processed

27
Q

TEE

A

trusted execution environment

28
Q

trusted execution environment

A

secure enclave; software environment where special applications and resources (files) have undergone rigorous checks to ensure they are trustworthy and remain protected

29
Q

processor security extensions

A

instructions that provide additional security features in the CPU and can be used to support a TEE

30
Q

Atomic execution

A

controlling the manner in which sections of a program run so that they cannot be interrupted between the start and end of the section

31
Q

STRIDE

A

developed by Microsoft; suitable for application to logical and physical systems alike

32
Q

MITRE ATT&CK framework

A

maps cyberthreat actor tactics to the techniques used for them and the detailed procedures used by specific threat actors during cyberattacks

33
Q

Data is encrypted in a self-encrypting drive system on

A

only on the disk drive; not in memory or on the bus

34
Q

Data is encrypted in a bus encryption system on …

A

everywhere except the cryptoprocessor where it is decrypted: on the disk drive, in memory, on the bus

35
Q

TPM vs HSM

A

TPM permanently mounted on the motherboard and used for hardware-based assurance and key storage; HSM removable or external and used for both hardware accelerated cryptography and key storage

36
Q

TPMs required features

A

storage of cryptographic keys and digital certificates, symmetric and asymmetric encryption, and hashing

37
Q

changing a password on a self-encrypting drive does …

A

the existing secret key is retained but is encrypted with the new password; encrypted data on the disk remains unaltered

38
Q

Processor security extensions

A

enable developers to encrypt memory associated with a process; instructions for security features in CPU to support a TEE