Domain 3 Flashcards
A security model that prevents a secret cleared subject from reading a top secret object. Also includes ‘no read up’ rule and focuses on protecting confidentiality
Bell-Lapadula
Biba is a model that protects _____
integrity
This security model is ‘no read down’ and ‘no write up’
BIba
This security model protects integrity by requiring subjects to access objects via programs. It focuses on having well formed transactions and separation of duties and access triple
Clark-Wilson
This security model is designed to avoid conflicts of interest by prohibiting one person from accessing multiple conflict of interest categories
Chinese Wall aka Brewer Nash
A table that defines the access permissions that exist between specific subjects and objects
access control matrix
A list of objects a subject is allowed to access
security domain
Processes communicate between CPU rings via _____ which allows processes to communicate with the kernel and provide a window between the rings
system calls
The ____ is the computer’s case that houses the computer’s internal electronic computer components ex: motherboard
system unit
This part of the CPU performs mathematical calculations
ALU (arithmetic logic unit)
The ALU is fed instructions by the ____ unit.
control
What is the ‘fetch and execute’ (aka FDX) steps?
- Fetch Instruction 1
- Decode Instruction 1
- Execute Instruction 1
- Write (save) Result 1
_____ combines multiple CPU steps into one process
pipelining
A parent process can spawn additional child processes called ____
threads
____ segmentation maps processes to specific memory locations
hardware
_____ provides virtual address mapping between applications and hardware memory
virtual mapping
____ uses virtual memory to to copy contents of primary memory (RAM) to secondary memory (CD)
Swapping
This storage can be written to once and read many times
WORM (write once, read many)
____ attempts to prevent code execution in memory locations that are not predefined to contain executable content
DEP (data execution prevention)
____ makes software exploitation more difficult by randomizing memory addresses
ASLR (address space location randomization)
____ mediates all access between subjects and objects and is ran by the kernel
reference monitor
Malware that needs a host
virus
Malware that self propogates
worm
A neutral technology used to shrink the size of executables
packer
____ are small pieces of mobile code embedded into web browsers that are executable and typically written in Java or ActiveX
Applets
Database ____ allows two objects to have the same name. Ex: two rows have the same primary key but different data
polyinstantiation
___ means the order of plaintext should be dispersed in the ciphertext
diffusion
___ means that the relationship between the plaintext and the ciphertext should be as confused or random as possible
confusion
___ replaces one character for another to provide confusion
substitution
____ also called transposition provides diffusion by rearranging the characters of the plaintext.
permutation
How long it will take to break a cryptosystem is called
work factor
prolonged loss of power
blackout
prolonged low voltage
brownout
short loss of power
fault
prolonged high voltage
surge