Domain 3: Security Architecture and Engineering Flashcards

1
Q

What shode be done Once security is integrated as an important part of the design?

A

engineered, implemented, tested, evaluated, and potentially certified and accredited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do we know if a product provides security?

A

CIA! The product must be evaluated against the availability, integrity, and confidentiality it claims to provide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is System Architecture?

A

Architecture Fundamental organization of a system embodied in its components, their relationships to each other and to the environment, and the principles guiding its design and evolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Components of Computer Architecture

A
  1. Input Unit and associated Peripherals
  2. Output unit and associated peripherals
  3. Storage unit/ memory
  4. Central processing unit (CPU)
  5. Operating system (OS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The FIVE responsibilities of memory manager are:

A
  1. Relocation
  2. Protection
  3. Sharing
  4. Logical Organization
  5. Physical Organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protection rings architecture

A

*Ring 0 Operating system kernel
*Ring 1 Remaining parts of the operating system
*Ring 2 I/O drivers and utilities
*Ring 3 Applications and user activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of OS Architecture

A
  1. monolithic operating system architecture
  2. Layered operating system architecture
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is virtual machine?

A

a computer system created using software on one physical computer in order to emulate the functionality of another separate physical computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the benefits of using a VM?

A

*Savings on hardware
* Under-utilized server (DHCP)
*Environmental costs
* Rack space, power consumption
*Management and administration
* Legacy applications can run in virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BIba model rules :

A

Biba has three main rules to provide this type of protection:
*integrity axiom
*Simple integrity axiom
*Invocation property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bell-LaPadula Model rules:

A

Simple Security, Star Property, and Strong Star Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Graham-Denning Model primarily concerned:

A
  1. how subjects and objects are created,
  2. how subjects are assigned rights/privilege, and
  3. how ownership of objects is managed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is cryptography?

A

Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process.The science of protecting information by encoding information into unreadable formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of Ciphers:

A

Substitution Cipher
Transposition Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Cryptanalysis?

A

Cryptanalysis is the science of studying and breaking the secrecy of encryption processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of encryption

A

Symmetric encryption
Asymmetric encryption

17
Q

Steganography

A

The process of hiding data in another media type so the existence of data is concealed