Domain 3 Flashcards

1
Q

Characteristics of Biba Model

A
All about Integrity
Write down, read up
STAR Integrity
Simple Integrity Property
Invocation Property
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Characteristics of Bell Lapadula Model

A
All about Confidentiality
Write up, read down
Star Property
Simple Property
Strong STAR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Fire Extinguishers

A
Class
A. Common Combustible
B. Liquid
C. Electrical
D. Metal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the State Machine Security Model

A

Based on Finite State Machine
Map out the finite possible operational outcomes
verify that all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Common Security Models

A
MATRIX - (Access Control)
Bell - Lapadula (Confidential control)
Biba (Integrity Control)
Information Flow Model
Clark Wilson (Integrity Model)
Multi Level Lattice
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information Flow Model

A

Extends The State Machine Model
Finite State Machine; you specify well defined paths for information to flow on those paths
Uses lots of reference monitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-Interference Model

A

Make sure objects and subjects are not affected on the level you’re at

Mandates that there is a hierarchy of levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MATRIX Model

A

Provides Access rights

Matrix to match users to privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Clark Wilson Model

A

Integrity Model
Invented “Triple Security” which is now know as reference modeling
Very Commercial
Dictates
-Separation of Duties
- subjects access DTA through arbiter app
- Heavy Auditing Requiring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Brewer Nash (Chinese Wall)

A

Stopping conflicts of internet problems

poster child of where BN should have been used in Arthur Anderson in Houston

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Graham Denning

A

Integrity and Confidentiality

Assigns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud Types

A

Public (AWS or AZURE)
Private (Data Center)
Community (Group of students sharing a space)
Hybrid (Hosting your website to public on private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Deployment Models

A

IaaS (provide your own software)
PaaS (cloud provider uses software and your software)
SaaS ( All software is Cloud providers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Traits of Cloud

A
Rapid Elasticity
On Demand Self Service
Metered Service
Broad Network Access
Resource Pooling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud Security Issues

A

Lose controls over security implementation
All security actions must be documented and put in contract BEFORE signing
Who is cloud provider, need to trusted
Limited authentication capabilities
Lack of Access to logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptography Goals

A

P.A.I.N.

Privacy (confidentiality)
Authentication
Integrity
Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Types of Security Models

A
State Machine Models
Multi Lattice Models
Matrix Models
noninterference Models
Information Flow Models
Confinement
Data in Use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List the 7 EAL levels

Common Criteria Assurance Level

A

EAL 1 Functionally tested
EAL 2 Structurally tested
EAL 3 Methodically tested and checked
EAL 4 Methodically designed, tested and reviewed
EAL 5 Semi-formally designed and tested
EAL 6 Semi-formally verified design and tested
EAL 7 Formally verified design and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define Certification

A

evaluation of security and technical/non-technical features meet requirement (verify it does what it says it does)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define Accreditation

A

Declare that an IT system is approved to operate in predefined conditions (verify it is right for out system, network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Use of Cryptography

A
Confidentiality
Integrity
Proof of Origin
Non-repudiation
Protect Data at Rest
Protect Data in Motion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the Orange Book

A

Collection of criteria based on the Bell-Lapadula Model used to grade or rate the security offered by a computer system product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Trusted Computer System Evaluation (TCSEC)

A

Evaluates OS, application and system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Green Book

A

Password Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Red Book

A

Similar to Orange book, but addresses network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Chain of Custody

A

Important to Maintain to prove integrity of evidence to be admissible in court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Interview Notes (Evidence collection)

A

Discoverable Evidence

State Only Facts, No opinions

28
Q

Core competencies of Forensics

A

Media Analysis
Network Analysis
Software Analysis
Embedded Devices

29
Q

Criminal Court Types of Verdicts

A

Guilty or Not Guilty Beyond a reasonable Doubt

30
Q

Civil Court Types of Verdicts

A

Liable or NOT liable

Preponderance of the evidence (There can be some doubt, however, the evidence leans a certain direction)

31
Q

Do you call immediately call law enforcement when a crime has happened

A

Follow what Policy and Senior Management dictate

32
Q

Symmetric Algorithms

A
DES - (Broken)
3DES
AES
Skip Jack
Blowfish
Twofish
RC4
IDEA
CAST
33
Q

Asymmetric Algothrims

A

Diffie-Hellman
RSA
Elgamal (terrible, subject to cipher text attack)
Elliptical

34
Q

Parole Evidence Rule

A

Whatever is in written agreement is what will win in court. Cant have a written contract, then a verbal agreement later

35
Q

Two Kinds of Failure Modes

A

Physical Security Failure Mode

Logical Security Failure Mode

36
Q

Logical Failure Modes

A

Fail Open - Availability is main concern

Fail Closed - Main concern is confidentiality and/or Integrity

Fail Secure - “Fail into a consistent state” fails to desired state

Fail Soft - “fail in to a diminished operating capacity”; essentially Hibernate mode

Fail Safe - “When I fail, I take nothing else with me”

37
Q

Physical Failure Modes

A

Fail Secure - Locks Doors both ways (no in or out)

Fail Safe - Locks Doors one way (get out but not in)

Fail Open - Does not lock (can get in and out)

38
Q

Physical Failure Modes

A

Fail Secure - Locks Doors both ways (no in or out)

Fail Safe - Locks Doors one way (get out but not in)

Fail Open - Does not lock (can get in and out)

39
Q

Incident Response Steps

A
1. Triage
     Detect
     Assess
     Communicate
     *React
2. Corrective/Investigation
     Containment
     Eradication
     Root Cause Analysis
3. Recovery
     Getting back to pre incident production
4. Lessons Learned
    Ask 3 questions
         Could we have responded better?
         Could we have prevented this incident completely
         Are we sure it was the root cause?
40
Q

Disaster Recovery Plan Testing Plans

A
  1. Desk Check
  2. Tabletop Exercise
  3. Structured Walkthrough
  4. Parallel
  5. Full scale
41
Q

When is disaster considered over

A

Disaster is officially over when business is back at 100 percent operational to whatever designated site is to be used

42
Q

Disaster recovery attributes

A

Recover Most critical First

Moving to hot site/temp location

43
Q

Disaster restoration attributes

A

Recover least critical first

Moving from hot site/temp location back or to new permanent location

44
Q

Types of Communications Plans

A

Hazard Communications plan

Personnel Communications plan

45
Q

Crime Prevention through environmental Design (CPTED)

A

The ability to create land scaping that will identify boundaries, slow,

46
Q

4 foot fence keeps out how many intruders

A

Casual intruders

47
Q

6 foot fence keeps out what intruder

A

Most Intruders

48
Q

8 foot fence keeps out what intruders

A

Determined Intruders

49
Q

If a gate is in front of a residence, not matter the type

A

is considered a residential gate

50
Q

Types of Commercial Gates

A
residential Gate (in front of homes)
Vehicle Gate (controls flow of vehicles)
Industrial Gate (controls flow of people)
Penitentiary Gate (chain link man trap)
51
Q

Type of Security Lights

A
Sodium Light (yellow Hue)
This is the best because it works in foggy environment
52
Q

Window Security Best Practices

A
Steel Frames
Not near doors
first floor place landscaping in front to deter or prevent access
Tempered glass
laminate/wired mesh for tempered glass
53
Q

How to Detect broken Windows

A

Capacitance (Low voltage around window. when broken circuit breaks)

Volume Metric

Acoustical

54
Q

Five classes of fire

A

Class A. Paper, wood, conventional (ASH)
Class B. Flammable Liquids (Beverage) (don’t spray water on this)
Class C. Electrical Fire (turn off power) (Circuit)
Class D. Metals (Dent metal)
Class E.

55
Q

Fire needs

A

Oxygen
Fuel
Heat

56
Q

What does Fire Suppression try to stop or restrict during fire

A

Oxygen
Fuel
Heat

57
Q

Types of Sprinkler System for fire suppression

A

Wet Pipe
Deluge (flooding)
Dry Pipe (Pressurized Air)
Halon (removes oxygen, dangerous for humans)
ARO-K (
FM200
ARGON ( Replace oxygen, suppresses fire, safe for humans)

58
Q

Recommended Fire suppression systems in server environments

A

ARO-K (
FM200 (
ARGON (Replace oxygen, suppresses fire, safe for humans)

59
Q

Types of alternative Sites

A

Cold Site (Location with no equipment, but have an alternate place available)

Warm Site (Various level of backup in between cold and hot site some equipment readiness in alternate site)

Hot Site (Equipment ready for use. Just restore latest backups and go, likely daily update)

Mirroring (Equipment ready, backups sent and restored offsite immediately)

Redundant Operations (most expensive as there are dual operations (least amount of down time or impact)

60
Q

Alternatives to Alternative Sites

A

Mobile Site (business work trailer)
Reciprocal Agreements (Other company agrees to support and you support their company, bad idea, must rely on company)
Outsourcing (get other company to work my business_
Cloud
Hypervisor

61
Q

What impacts Electric Performance

A

Voltage

Amperage

62
Q

External Monitoring

A

Time domain reflectometry (TDR) - uses light to help detect intrusion.

Coaxial Strain sensitive Cable (CSSC) - Uses electricity

Microwave - emitter on one end, receiver on the other, if plane in broken by person, it will set it off. (can go through dry items, even concrete walls)

Guard (human can react to new situations)

63
Q

What is external monitoring

A

Monitors intrusion and alerting people exactly where and how far away

64
Q

Volume Metric

A

sets sound in room, if somethin enter room, it changes the metric and sets alarm

65
Q

Motion Detector Technology

A

Volume Metric

Doppler Detection

66
Q

RAID Types

A
RAID0 Striping
RAID1  Mirroring
RAID3 Parity 
RAID4 Parity
RAID5 Parity
RAID 10 striping and Mirroring
RAID 15 Parity and Mirroring

https://www.prepressure.com/library/technology/raid