D3 - Security Architecture and Design Flashcards

1
Q

System’s architecture is make up of different _, which are representations of system _ and their . Each view addresses a different aspect of the sytem (, _ , _, _)

A

views
components; relationships
functionality; performance; interoperability; security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISO/IEC 42010:2007

A

International Standard

Outlines how system architecture frameworks and their description languages are to be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CPU contains a _ and _.

A

Contains a control unit, which controls the timing of the execution of instructions and data.
ALU, performs mathematical functions and logical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Memory managers use various memory protection mechanisms, such as:

A

base (beginning0 and limit (ending) addressing
address space layout randomization
data execution prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Operating systems use what kind of memory schemes?

A

absolute (hardware addresses), logical (indexed addresses), and relative address (indexed addresses, including offsets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are buffer overflow vulnerabilities best addressed?

A

implementing bounds checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a garbage collector?

A

A software tool that releases unused memory segments to help prevent “memory starvation”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Different processor families work within different _ to execute specific instruction sets.

A

microarchitectures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why were early operating systems considered “monolithic”?

A

Because all of the code worked within one layer and ran ni kernal mode, components communicated in an ad hoc manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operating systems can work iwthin the following architecutres:

A

monolithic kernal, microkernal, hybrid kernal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is mode transition?

A

when a CPU has to switch from executingone process’s instructions running in user mode to another process’s instructions running in kernal mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CPUs provide a ringed architecture, which _ _ run within. The more trusted processes run in the - rings and have access to all or most of the _ _. Nontrusted processes run in - rings and have access to smaller amount of resources.

A

operating systems
lower-numbered
system resource
higher-numbered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Operating system processes are executed in _ or _ mode.

Applications are executed in _ mode, also known as “_ _”.

A

privileged; supervisor

user; “problem state”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does virtual storage combine to have a larger bank of memory?

A

RAM and secondary storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The more complex a security mechanism is the _ amount of assurance it can usually provide

A

less

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCB - Trusted computing base

A

A collection of system components that enforce the security policy directly and protect the system. These components are within the security perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What components make up the TCB?

A

hardware, software, firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a security perimeter?

A

An imaginary boundary that has trusted components within it (those that make up the TCB and untrusted components outside it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Reference Monitor

A

An abstract machine that ensures all subjects have the necessary access rights before accessing objects. It mediates all access to objects by subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Security kernal

A

mechanism that actually enforces the rules of the reference monitor concept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are necessary concepts for the security kernal?

A

It must isolate processes carrying out the reference monitor concept
must be tamperproof
Must be invoked for each access attempt
Must be small enough to be properly tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How can processes be isolated?

A
Segmneted memory addressing
Encapsulation of objects
Time multiplexing of shared resources
Naming distinctions
Virtual mapping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The level of security a system provides depends upon how well it enforces its _ _

A

security policy

24
Q

Multilevel security system

A

Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system

25
Q

When does data hiding occur?

A

When processes work at different layers and have layers of access control between them. Processes need to know how to communicate only iwht each other’s interfaces.

26
Q

Security model

A

Maps the abstract goals of a security policy to computer system terms and concepts. Gives the security policy structure and provides a framework for the system

27
Q

A _ _ is often proprietary to the manufacturer or vendor.

A

closed system

28
Q

An _ _ allows for more interoperability

A

Open system

29
Q

The Bell-LaPadula model deals only with _, while the Biba and Clarke-Wilson models deal only with _.

A

confidentiality

integrity

30
Q

State machine model

A

Deals with the different states a system can enter. If a system starts ins a secure state, all state transitions take place securely, the system shuts down and fails securely and the system will never end up in an insecure state.

31
Q

Lattice Model

A

provides an upper bound and a lower bound of authorized access for subjects

32
Q

The Bell-LaPadula model has a simple security rule, which means:

A

A subject cannot read data from a higher level (no read up).

33
Q

Bell-LaPadula *-property rule means:

A

the subject cannot write to an object at a lower level (no write down).

34
Q

Bell-LaPadula strong star property:

A

a sbuject can read and write to its own security level

35
Q

The Biba model does not let subjects _ to objects at a higher integrity level (no _ up) and does not let subjects read data at a _ integrity level (no read down). This is done to protect the integrity of the data.

A

write; write

lower

36
Q

The LBell LaPadula model is used mainly in _ and _-oriented systems. The Biba and Clark-Wilson models are used in the _ sector.

A

military; government

commercial

37
Q

Clark-Wilson Model

A

subjects can only access objects through applications. Illustrates how to provide functionality for separation of duties and requires auditing tasks within software.

38
Q

What does it mean when a system is working in a dedicated security mode?

A

It only deals with one level of data classification; all users must have this level o fclearance to be able to use the system

39
Q

Trust

A

A system uses all of its protectio nmechanisms properly to process sensivtive data for many types of users.

40
Q

Assurance

A

level of cnofidence you have in this trust and that the protection mechansisms behave properly in all circumstances predictably

41
Q

Orange Book aka TCSEC (Trusted Computer System Evaluation Criteria)

A

Developed to evaluate systems built to be mainly used by the government; the expanded

42
Q

Orange Book deals with main:

A

stand-alone systems

43
Q

ITSEC evaluates:

A

the asurance and functionality of a system’s protection mechanisms separately.

44
Q

Common Criterial

A

Provides globally recognized evaluation criterial, combining TCSEC, ITSEC, CTCPEC, Federal Criteria

45
Q

What does the Common C riteria use to provide assurance for targets of evaluation (TOE)

A

Protection profiles
Security Targets
Ratings (EAL1 to EAL7)

46
Q

Covert channel

A

An unintended communication path that transfers data in a way that violates the security policy.

47
Q

What are the two types of covert channels?

A

Timing & storage

48
Q

Covert timing channel

A

Enables a process to relay information to another process by modulating its use of system resources

49
Q

A covert storage channel

A

Enables a process to write data to a storage medium so another process can read it

50
Q

Why is a maintenance hookj developed?

A

To let a programmer into the application quickly for maintenance. Should be removed before the application goes into production or it can cause a serious security risk.

51
Q

What does process isolation ensure?

A

That multiple processes can run concurrently and the processes will not interfere with each other or affect each other’s memory segments.

52
Q

TOC/TOU

A

Time-of-check/time-of-use. Class of asynchronous attacks

53
Q

Biba model addresses the first coal of:

A

integrity; to prevent unauthorized users from making gmodifications

54
Q

Clark-Wilson model addressess all three integrity goals:

A

1- prevent users from making modifications
2 - prevent authorized users from improper modifications
3 - maintain interna and external consistency

55
Q

System architecture

A

Formal tool used to design computer systems in a maaner that ensures each of the stakeholder’s concerns is addressed