Chapter 9 - Security Vulnerabilities, Threats, and Countermeasures Flashcards
Multithread
A single-processor system can operate on only one thread at a time. There would be a total of four application threads, but the operating system would be responsible for deciding which single thread is running on the processor at any given time.
What type of memory device is usually used to contain a computers motherboard BIOS?
BIOS and device firmware are often stored on EEPROM chips to facilitate future firmware updates.
Three types of cloud computering
Software as a Service is where applications reside. Remember that raw data and volumes are at the lowest level (IaaS) and files and Application Programming Interfaces (APIs) reside in the platform area (PaaS).
Understanding the relationships and dependencies between cloud computing models is critical to understanding cloud computing security risks.
IaaS is the foundation of all cloud services, with PaaS building upon IaaS, and SaaS in turn building upon PaaS as described in the Cloud Reference Model diagram. In this way, just as capabilities are inherited, so are information security issues and risk. It is important to note that commercial cloud providers may not neatly fit into the layered service models.
Cloud computing deployment model
https://www.freepracticetests.org/quiz/uploads/images/cloud%20deployment%20models(1).png
Differences between maintenance hook and covert channel
A covert channel is an unintended communication path within a system, therefore it is not protected by the system’s normal security mechanisms. Covert channels are a secret way to convey information.
Covert channels are addressed from TCSEC level B2.
A maintenance hook is a hardware or software mechanism that was installed to permit system maintenance and to bypass the system’s security protections.