Domain 3. Security Architecture and Engineering Flashcards
CPU Register
A register is a temporary storage location located on the Central Processing Unit (CPU). It is used to store instruction sets. When a CPU executes an instruction set, it loads it from the register.
Known-Plaintext Attack
A known-plaintext attack is an attack model for cryptanalysis where the attacker has samples of both the plaintext and its encrypted version.
Secure defaults
Concept that products should have default settings that are intentionally secure.
This principle demands product and solution teams consider the security implications of weak “default” settings in their product or solution (e.g., passwords, algorithms, or controls) and instead utilize responsible default security settings, even if those increase the complexity of implementation or use.
A Salt is BEST defined as what?
A random value that is added to existing data before being hashed
Scytale, Vigenere, Caesar are types of what?
Ancient Ciphers
El Gamal
El Gamal is an asymmetric public-key algorithm. It was derived from Diffie-Hellman principles but was expanded to support an entire public-key cryptosystem. The main drawback of El Gamal is performance. It also doubles the length of any message it encrypts.
One-Time Pad
The only cryptography known to be impossible to crack.
One-Time pad requirements:
Keys must be genuinely random values
Keys can only be used one time
Keys must be exchanged securely
The sender and receiver must keep the keys secure
The key must be the same length as the message.
Vernam Cipher
Another name for One-time Pad
The only cryptography known to be impossible to crack.
One-Time pad requirements:
Keys must be genuinely random values
Keys can only be used one time
Keys must be exchanged securely
The sender and receiver must keep the keys secure
The key must be the same length as the message.
PGP - Symmetric or Asymmetric?
Symmetric
Third-Party Audit vs. External Audit
External Audits are any audit performed by an outside auditing firm.
Third-Party Audit is an audit conducted on behalf of another firm.
Abuse Case Testing
Subset of misuse case testing. Tests for intentional mis-use (as opposed to unintentional/accidental). Abuse case testing is a test to determine if a website, its hardware, software, and their interactions with one another have security vulnerabilities which could be used by attackers.
Misuse Case Testing
When we test for a case of misuse, we are testing to ensure a common user misuse doesn’t exploit a vulnerability.
What is Jack the Ripper
Psyche! Not a thing in CyberSecurity. JOHN the ripper is a password cracking tool. JACK the Ripper was a serial killer.
Infection Monkey
Open Source Breach Attack Simulation program.
Hydra
Password Cracking Tool
Birthday Attack
Attacker attempts to substitute one message for another message that generates the exact same hash and/or signature.
birthday attack exploits a mathematical principle on probability. This is known as the mathematical birthday paradox. For example, consider the scenario where a teacher with 30 students asks for everybody’s birthday. The odds are small if the teacher picked a specific day (say, 5th of October) that at least one student was born on that particular day, it’s around 8%. However, the probability that at least one student has the same birthday as any other student is about 70%.
Open System
Open Systems use agreed-upon insdustry standards.
Much easier to integrate multi-vendor solutions when industry standards are used.
i.e API, motherboard PCI connectors,
Closed System
Closed systems and proprietary systems use proprietary hardware or software.
Confinement (In context of running processes)
Another term for Sandboxing.
Confinement is used to restrict a process from interfering with the memory locations and resources of another process.
Multithreading
Allows multiple instruction sets to run in parallel under a single process
A thread is an individual instruction set that must be worked on by the CPU. Threads can execute in parallel with other threads that are part of the same parent process. This is known as multithreading. Threads are dynamically built and destroyed by the parent process. A process is a program loaded in memory. Most modern applications take advantage of multithreading.
Class A Combustible
Common combustibles, wood, paper.
Suppress with water, soda acid
Class B Combustible
Liquids - oil, gas, fuel
Suppress with COs, halon, or other gas option, soda acid.
Class C Combustible
Electrical
Suppress with CO2, halon, alternate gas option
Class D Combustible
Metals such as magnesium.
Suppress with dry powder
Class K Combustible
Cooking media - fats, grease, etc
Suppress with Alkaline mix.
Work Level
Metric that defines the strength of encryption. Very strong encryption will have a high work level