Domain 3: Security Architecture and Engineering Flashcards
What shode be done Once security is integrated as an important part of the design?
engineered, implemented, tested, evaluated, and potentially certified and accredited.
How do we know if a product provides security?
CIA! The product must be evaluated against the availability, integrity, and confidentiality it claims to provide.
What is System Architecture?
Architecture Fundamental organization of a system embodied in its components, their relationships to each other and to the environment, and the principles guiding its design and evolution.
Components of Computer Architecture
- Input Unit and associated Peripherals
- Output unit and associated peripherals
- Storage unit/ memory
- Central processing unit (CPU)
- Operating system (OS)
The FIVE responsibilities of memory manager are:
- Relocation
- Protection
- Sharing
- Logical Organization
- Physical Organization
Protection rings architecture
*Ring 0 Operating system kernel
*Ring 1 Remaining parts of the operating system
*Ring 2 I/O drivers and utilities
*Ring 3 Applications and user activity
Types of OS Architecture
- monolithic operating system architecture
- Layered operating system architecture
What is virtual machine?
a computer system created using software on one physical computer in order to emulate the functionality of another separate physical computer
What are the benefits of using a VM?
*Savings on hardware
* Under-utilized server (DHCP)
*Environmental costs
* Rack space, power consumption
*Management and administration
* Legacy applications can run in virtual machines
BIba model rules :
Biba has three main rules to provide this type of protection:
*integrity axiom
*Simple integrity axiom
*Invocation property
Bell-LaPadula Model rules:
Simple Security, Star Property, and Strong Star Property
Graham-Denning Model primarily concerned:
- how subjects and objects are created,
- how subjects are assigned rights/privilege, and
- how ownership of objects is managed
What is cryptography?
Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process.The science of protecting information by encoding information into unreadable formats.
Types of Ciphers:
Substitution Cipher
Transposition Cipher
What is Cryptanalysis?
Cryptanalysis is the science of studying and breaking the secrecy of encryption processes