D3 - Security Architecture and Design Flashcards
System’s architecture is make up of different _, which are representations of system _ and their . Each view addresses a different aspect of the sytem (, _ , _, _)
views
components; relationships
functionality; performance; interoperability; security
ISO/IEC 42010:2007
International Standard
Outlines how system architecture frameworks and their description languages are to be used.
CPU contains a _ and _.
Contains a control unit, which controls the timing of the execution of instructions and data.
ALU, performs mathematical functions and logical operations
Memory managers use various memory protection mechanisms, such as:
base (beginning0 and limit (ending) addressing
address space layout randomization
data execution prevention
Operating systems use what kind of memory schemes?
absolute (hardware addresses), logical (indexed addresses), and relative address (indexed addresses, including offsets)
How are buffer overflow vulnerabilities best addressed?
implementing bounds checking
What is a garbage collector?
A software tool that releases unused memory segments to help prevent “memory starvation”
Different processor families work within different _ to execute specific instruction sets.
microarchitectures
Why were early operating systems considered “monolithic”?
Because all of the code worked within one layer and ran ni kernal mode, components communicated in an ad hoc manner
Operating systems can work iwthin the following architecutres:
monolithic kernal, microkernal, hybrid kernal
What is mode transition?
when a CPU has to switch from executingone process’s instructions running in user mode to another process’s instructions running in kernal mode.
CPUs provide a ringed architecture, which _ _ run within. The more trusted processes run in the - rings and have access to all or most of the _ _. Nontrusted processes run in - rings and have access to smaller amount of resources.
operating systems
lower-numbered
system resource
higher-numbered
Operating system processes are executed in _ or _ mode.
Applications are executed in _ mode, also known as “_ _”.
privileged; supervisor
user; “problem state”
What does virtual storage combine to have a larger bank of memory?
RAM and secondary storage
The more complex a security mechanism is the _ amount of assurance it can usually provide
less
TCB - Trusted computing base
A collection of system components that enforce the security policy directly and protect the system. These components are within the security perimeter.
What components make up the TCB?
hardware, software, firmware
What is a security perimeter?
An imaginary boundary that has trusted components within it (those that make up the TCB and untrusted components outside it.
Reference Monitor
An abstract machine that ensures all subjects have the necessary access rights before accessing objects. It mediates all access to objects by subjects.
Security kernal
mechanism that actually enforces the rules of the reference monitor concept
What are necessary concepts for the security kernal?
It must isolate processes carrying out the reference monitor concept
must be tamperproof
Must be invoked for each access attempt
Must be small enough to be properly tested
How can processes be isolated?
Segmneted memory addressing Encapsulation of objects Time multiplexing of shared resources Naming distinctions Virtual mapping