Domain 3. Security Architecture and Engineering Flashcards

1
Q

CPU Register

A

A register is a temporary storage location located on the Central Processing Unit (CPU). It is used to store instruction sets. When a CPU executes an instruction set, it loads it from the register.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Known-Plaintext Attack

A

A known-plaintext attack is an attack model for cryptanalysis where the attacker has samples of both the plaintext and its encrypted version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure defaults

A

Concept that products should have default settings that are intentionally secure.

This principle demands product and solution teams consider the security implications of weak “default” settings in their product or solution (e.g., passwords, algorithms, or controls) and instead utilize responsible default security settings, even if those increase the complexity of implementation or use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Salt is BEST defined as what?

A

A random value that is added to existing data before being hashed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Scytale, Vigenere, Caesar are types of what?

A

Ancient Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

El Gamal

A

El Gamal is an asymmetric public-key algorithm. It was derived from Diffie-Hellman principles but was expanded to support an entire public-key cryptosystem. The main drawback of El Gamal is performance. It also doubles the length of any message it encrypts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

One-Time Pad

A

The only cryptography known to be impossible to crack.

One-Time pad requirements:

Keys must be genuinely random values
Keys can only be used one time
Keys must be exchanged securely
The sender and receiver must keep the keys secure
The key must be the same length as the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vernam Cipher

A

Another name for One-time Pad

The only cryptography known to be impossible to crack.

One-Time pad requirements:

Keys must be genuinely random values
Keys can only be used one time
Keys must be exchanged securely
The sender and receiver must keep the keys secure
The key must be the same length as the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PGP - Symmetric or Asymmetric?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Third-Party Audit vs. External Audit

A

External Audits are any audit performed by an outside auditing firm.

Third-Party Audit is an audit conducted on behalf of another firm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Abuse Case Testing

A

Subset of misuse case testing. Tests for intentional mis-use (as opposed to unintentional/accidental). Abuse case testing is a test to determine if a website, its hardware, software, and their interactions with one another have security vulnerabilities which could be used by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Misuse Case Testing

A

When we test for a case of misuse, we are testing to ensure a common user misuse doesn’t exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Jack the Ripper

A

Psyche! Not a thing in CyberSecurity. JOHN the ripper is a password cracking tool. JACK the Ripper was a serial killer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Infection Monkey

A

Open Source Breach Attack Simulation program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hydra

A

Password Cracking Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Birthday Attack

A

Attacker attempts to substitute one message for another message that generates the exact same hash and/or signature.

birthday attack exploits a mathematical principle on probability. This is known as the mathematical birthday paradox. For example, consider the scenario where a teacher with 30 students asks for everybody’s birthday. The odds are small if the teacher picked a specific day (say, 5th of October) that at least one student was born on that particular day, it’s around 8%. However, the probability that at least one student has the same birthday as any other student is about 70%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Open System

A

Open Systems use agreed-upon insdustry standards.

Much easier to integrate multi-vendor solutions when industry standards are used.

i.e API, motherboard PCI connectors,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Closed System

A

Closed systems and proprietary systems use proprietary hardware or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Confinement (In context of running processes)

A

Another term for Sandboxing.

Confinement is used to restrict a process from interfering with the memory locations and resources of another process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Multithreading

A

Allows multiple instruction sets to run in parallel under a single process

A thread is an individual instruction set that must be worked on by the CPU. Threads can execute in parallel with other threads that are part of the same parent process. This is known as multithreading. Threads are dynamically built and destroyed by the parent process. A process is a program loaded in memory. Most modern applications take advantage of multithreading.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Class A Combustible

A

Common combustibles, wood, paper.

Suppress with water, soda acid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Class B Combustible

A

Liquids - oil, gas, fuel

Suppress with COs, halon, or other gas option, soda acid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Class C Combustible

A

Electrical

Suppress with CO2, halon, alternate gas option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Class D Combustible

A

Metals such as magnesium.

Suppress with dry powder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Class K Combustible

A

Cooking media - fats, grease, etc

Suppress with Alkaline mix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Work Level

A

Metric that defines the strength of encryption. Very strong encryption will have a high work level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Common Criteria - Use and EAL levels

For Sure My Mother - So Sweet Forever

A

Common standard for evaluating technology products. Has 7 levels

EAL1-Functionally tested
EAL2-Structurally testeed
EAL3-Methodically tested, checked
EAL4-Methodically designed, tested, reviewed
EAL5-Semiformally designed and tested
EAL6-Semiformally verified designed, and tested
EAL7-Formally verified design, and tested

28
Q

TCP SYN Scan

A

AKA Half Open scanning

Scanner sends a SYN packet and waits for a SYN ACK packet - but the scanner doesn’t then respond with an ACK packet.

29
Q

Most common cause of a false positive in regards to water-based fire suppression

A

People

30
Q

TOC/TOU Attack

A

Time of check, time of use attack.

Sometimes called a “race condition”, occurs when an attacker exploits the gap in time that exists between the processing of different instructions in an ordered set to circumvent security controls.

31
Q

Multi processing

A

When CPUs are used in parallel, it is called multiprocessing. Multiprocessing is the parallel execution of instructions. If a computer has more than one CPU, they can be used in parallel to execute instructions. For example, a database server can use up to eight processors at the same time to improve performance for data queries.

32
Q

FM-200

A

Replacement for Halon as a fire suppressant.

uses HFC-227ea, leaves no residue, and does not require costly cleanup. FM-200 systems replace halon, which was banned in the US in 1994 as an environmental hazard.

33
Q

CPU Architecture - Ring 0

A

Kernel

34
Q

CPU Architecture - Ring 1

A

Operating System

35
Q

CPU Architecture - Ring 2

A

Drivers

36
Q

CPU Architecture - Ring 3

A

Applications

37
Q

ASLR - Address Space Layout Randomization

A

A Memory protection methodology that randomizes memory locations.

38
Q

Common Access Cards

A

Smart cards used by the U.S. government are known as common access cards (CACs).

39
Q

SCADA

A

Supervisory Control and Data Acquisition:

Controls multiple process, and can span large geographical areas.

40
Q

ICS

A

Industrial Control System

41
Q

DCS - Distributed System Controller

A

Distributed Control System:

Network of PLCs

Generally, DCS is process-specific and does not span large geographical areas.

Often integrated into other scada systems.

42
Q

PLC

A

Programmable Logic Controller:

PLCs are often networked and controlled by a supervisory computer.

43
Q

ALU - Arithmetic Logic Unit

A

Component of the CPU - “Brain” of the CPU.

The arithmetic logic unit (ALU) is a series of physical circuits that perform bitwise operations on binary numbers. The circuits are built using logic gates made from transistors.

44
Q

How many stages in a fire?

A

4

Incipient - triggers air ionization but has no smoke
Smoke - displays smoke
Flame - visible flames
Heat - heat buildup and burning of surrounding objects

45
Q

How many OS process states are there?

A

5:

Ready
Running
Waiting
Supervisory
Stopped

46
Q

Preferable Humidity range for Electronics

A

20%-80% (OSG)

40%-60% (Learnzapp)

47
Q

Trusted Computing Base

A

The trusted computing base is the total combination of protection mechanisms for a computer system, including hardware, software, and firmware.

The combination of hardware, software, and controls that form a trusted base that enforces your security policy.

48
Q

Tape Jukebox AKA Tape Library

A

A device that contains multiple backup tapes and rotates them automatically

49
Q

RAID 0

A

Striping

50
Q

RAID 1

A

Mirroring

51
Q

RAID 10

A

Mirror of stripes

52
Q

RAID 5

A

Striping with parity

53
Q

RAID 6

A

Striping with double parity

54
Q

Secondary Memory

A

Secondary memory, also called secondary storage, includes non-volatile storage such as a floppy disk, hard drive, or CD-ROM.

CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition. Pg 365-366.

55
Q

Primary Memory

A

(Also called Primary Storage in some questions I’ve taken)

Primary memory is the RAM the computer uses to keep necessary information readily available to CPU.

CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition. Pg 366.

56
Q

Reference Monitor

A

The reference monitor is an abstract machine that is used to implement security. The reference monitor’s job is to validate access to objects by authorized subjects. The reference monitor operates at the boundary between the trusted and untrusted realm. The reference monitor has three properties:

Cannot be bypassed and controls all access
Cannot be altered and is protected from modification or change
Can be verified and tested to be correct

57
Q

Security Kernel

A

reference monitor is a concept in which an abstract machine mediates all access to objects by subjects. The security kernel is the hardware, firmware, and software of a TCB that implements this concept.

CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition. Pg 324-325.

58
Q

S/MIME

A

Secure Multipurpose Internet Mail Extensions (S/MIME) is used to encrypt and digitally sign email. S/MIME uses the RSA encryption algorithm and has been incorporated into many commercial products.

59
Q

Multilevel Processing

A

A multilevel approach allows for the processing of data at different security levels. Information is allowed to flow between different access levels, provided the user has the proper clearance. Multilevel models are a category in the information-flow model.

60
Q

PASTA

A

7 stages

Process for Attack Simulation and Threat Analysis:

Seven stage threat modeling methodology. This is a risk-centric approach that aims at selecting countermeasures in relation to the value of the assets to be protected.

61
Q

SD3+C

A

Microsoft Security Development Cycle

Secure by Design

Secure by Default

Secure in Deployment and Communication

62
Q

STRIDE

A

Threat Categorization scheme developed by microsoft.

63
Q

Tape Librarian

A

The tape librarian generally has access to media storage facilities. They are responsible for check-in and check-out processes, keeping the storage facility locked, and sanitizing media when it’s returned for reuse.

64
Q

Zero-knowledge proof

A

A zero-knowledge proof allows one party to demonstrate knowledge of a secret without actually disclosing that secret to the other party. It is a method commonly applied in cryptography to validate passwords and keys (for example, validating an asymmetric private key through the use of a public key).

65
Q

TEMPEST

A

United States government standard for limiting electric or electromagnetic radiation emanations from electronic equipment

66
Q

Heartbeat Sensor

A

Mechanism attached to analog alarm system to periodically check in with the security/alarm company.