CISSP Notes 3 Flashcards
Packers
Provide runtime compression of executables. The original .exe is compressed, and a small executable decompresser is prepended to the .exe. Upon execution the decompresser unpacks the compressed executable machine code and runs it.
compartmented security mode
A system is operating in ________ when all users have clearance to access all the information processed by the system in a system high-security configuration, but might not have the need-to-know and formal access approval.
Sutherland Model
A model that is based on the idea of defining a set of system states, initial states, and state transitions. Through the user of only these predetermined secure states, integrity is maintained and interference is prohibited.
Hardware Segmentation
Physically mapping software to individual memory segments.
System-High Security Model
A system is operating _____ when all users have a security clearance to access the information but not necessarily a need-to-know for all the information processed on the system.
Garbage Collector
Tool that marks unused memory segments as usable to ensure that an operating system does not run out of memory.
Trusted Paths
For the TCB to communicate with the rest of the system, it must create secure channels, also called _____
System State
A snapshot of a system at a specific moment in time.
Absolute Address
Hardware addresses used by CPU.
Sandbox
Designed to prevent an attacker who is able to compromise a java applet from accessing system files, such as the password file.
Accreditation
Is the formal declaration by the designated approving authority that an IT system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk
Transformation Procedures (TP)
______ are the only procedures that are allowed to modify a constrained data item (CDI)
ActiveX
Are the functional equivalents of Java applets. They use digital certificates instead of a sandbox to provide security. They are tied more closely to the operating system, allowing functionality such as installing patches via Windows Update.
ITSEC
European standard used to assess the effectiveness of the security controls built into a system.
Read-Only Memory (ROM)
Nonvolatile memory that is used on motherboards for BIOS functionality and various device controllers to allow for operating system-to-device communication. Sometimes used for off-loading graphic rendering or cryptographic functionality.
System security capabilities
The _____ of information systems include memory protection, virtualization, Trusted Platform Module, interfaces and fault tolerance.
Cache
Fast and expensive memory type that is used by a CPU to increase read and write operations.
Clark-Wilson Model
A security model that uses multifaceted approach to enforcing data integrity. Instead of defining a formal state machine, this model defines each data item and allows modifications through only small set of programs.
Security Kernel
The collection of components in the TCB that work together to implement reference monitor functions.
Logical Addressing
Indirect addressing used by processes within an operating system. The memory manager carries out logical-to-absolute address mapping.
Emanation
_____ is energy that escapes an electronic system, which may be remotely monitored under certain circumstances.
Goguen-Meseguer Model
The ____ model is based on predetermining the set or domain - a list of objects that a subject can access. This model is based on automation theory and domain separation.
Assurance evaluation criteria
The comprehensive evaluation of the technical and nontechnical security features of an IT system and other safeguards.
TCSEC
U.S. DoD standard used to assess the effectiveness of the security controls built into a system. Replaced by the Common Criteria.