Domain 3 - Security Architecture and Engineering Flashcards

1
Q

Define Brewer-Nash model

A

The Brewer-Nash model allows access controls to change dynamically based upon a user’s actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the “ m of n “ control?

Harry would like to retrieve a lost encryption key from a database that uses m of n control, with m = 4 and n = 8. What is the minimum number of escrow agents required to retrieve the key?

A

In an m of n control system, at least m of n possible escrow agents must collaborate to retrieve an encryption key from the escrow database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Digital signatures that are approved part of the federal Digital Signature Standard under FIPS 186-4

A

RSA
ECDSA
DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Another term for sandbox

A

Confinement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ is the degree of confidence that an organization has that its security controls are correctly implemented. It must be continually monitored and reverified.

A Trust
B Credentialing
C Verification
D Assurance

A

D.
Assurance is the degree of confidence that an organization has that its security controls are correctly implemented. It must be continually monitored and reverified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Maintenance Hook

A

Maintenance hooks, otherwise known as backdoors, provide developers with easy access to a system, bypassing normal security controls. If not removed prior to finalizing code, they pose a significant security vulnerability if an attacker discovers the maintenance hook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Biba model (two) attributes

A

a. Simple Integrity Property NO READ DOWN
b. *(star) Integrity Property NO WRITE UP

INTEGRITY ONLY!!NO READ DOWN, NO WRITE UP**

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Bell-LaPadula model attributes

A

a. Simple Security Property. NO READ UP! Example: Secret cannot read up to TOP Secret
b. *(star) Security Property. NO WRITE DOWN Example: Moving TOP SECRET data to Secret level

CONFIDENTIALITY of DATA ONLY!!NO READ UP, NO WRITE DOWN**

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Clark-Wilson model attributes

A

a. Preventing unauthorized users from making modifications to data or programs
b. Preventing authorized users from making improper or unauthorized modifications
c. Maintaining internal and external consistency of data and programs

INTEGRITY ONLY!!SUBJECT|PROGRAM|OBJECT**

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does TPM hardware restrict users from doing?

A

Prevents someone from accessing an encrypted drive by installing it in another computer.

Definition: Trusted Platform Module (TPM) is a hardware security technique that stores an encryption key on a chip on the motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric cryptosystem

A

sender of a message always encrypts the message using the recipient’s public key.

Recipient decrypts with recipients private key

Sender creates digital signature using sender private key. Recipient verifies signature using sender public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a “salt” in terms of passwords?

A

salt is a random value added to a password before it is hashed by the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of fire suppression system fills with water when the initial stages of a fire are detected and then requires a sprinkler head heat activation before dispensing water?

A. Wet Pipe
B. Dry Pipe
C. Deluge
D. Preaction

A

D.

A preaction fire suppression system activates in two steps. The pipes fill with water once the early signs of a fire are detected. The system does not dispense water until heat sensors on the sprinkler heads trigger the second phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What IPSEC configuration provides confidentiality for the content of packets?

A

ESP

Encapsulating Security Payload (ESP) protocol provides confidentiality and integrity for packet contents. It encrypts packet payloads and provides limited authentication and protection against replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 5 defining characteristics of cloud based technologies?

A
  1. On demand self service
  2. Broad Network Access
  3. Resource Pooling
  4. Rapid Elasticity
  5. Measured Service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 cloud service models that everyone agrees on?

A
  1. SAAS (Software as a service)
  2. PAAS (Platform as a Service)
  3. IAAS (Infrastructure as a Service)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the four cloud deployment models?

A
  1. Private
  2. Community (Private cloud within Private
    Cloud)
  3. Public (World Wide Web)
  4. Hybrid (Mix of two or more of above)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define Type I Hypervisor

A

Native Bare Metal

Example: eSXI, HYPER V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define Type II Hypervisor

A

Hosted on a client O/S

Example: Virtual Box, Parallels. Application that runs on top of OS that provides virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define this OWASP attack type:

When un-trusted data is sent to an interpreter as part of a command query.

A

Injection.

SQL, NOSQL, OS, LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define this OWASP attack type:

Application functions related to authentication and session management are often implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities temporarily or permanently.

A

Broken Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Attackers may steal or modify weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browser.

A

Sensitive Data Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define this OWASP attack type:

Many older or poorly configured XML processors evaluate external entity references within XML documents. External entities can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks.

A

XML External Entities (XXE)

Applications and in particular XML-based web services or downstream integrations might be vulnerable to attack if:

• The application accepts XML directly or XML uploads, especially from
untrusted sources, or inserts untrusted data into XML documents, which is then parsed by an XML processor.

• Any of the XML processors in the application or SOAP based web services has
document type definitions (DTDs) enabled. As the exact mechanism for disabling DTD processing varies by processor, it is good practice to consult a reference such as the OWASP Cheat Sheet ‘XXE Prevention’.

• If your application uses SAML for identity processing within federated
security or single sign on (SSO) purposes. SAML uses XML for identity assertions, and may be vulnerable.

• If the application uses SOAP prior to version 1.2, it is likely susceptible
to XXE attacks if XML entities are being passed to the SOAP framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define this OWASP attack type:

Restrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can exploit these flaws to access unauthorized functionality and/or data, such as access other users’ accounts, view sensitive files, modify other users’ data, change access rights, etc…

A

Broken Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
# Define this OWASP attack type: The most commonly seen issue. The result of insecure default configurations, incomplete or ad hoc configurations, open cloud storage, misconfigured HTTP headers, and verbose error messages containing sensitive information. Not only must all operating systems, frameworks, libraries, and applications be securely configured, but they must be patched and upgraded in a timely fashion.
Security Misconfiguration
26
# Define this OWASP attack type: flaws occur whenever an application includes untrusted data in a new web page without proper validation or escaping, or updates an existing web page with user-supplied data using a browser API that can create HTML or JavaScript.
Cross-Site Scripting (XSS)
27
# Define this OWASP attack type: Often leads to remote code execution. Even if deserialization flaws do not result in remote code execution, they can be used to perform attacks, including replay attacks, injection attacks, and privilege escalation attacks.
Insecure Deserialization
28
# Define this OWASP attack type: Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover. Applications and APIs using components with known vulnerabilities may undermine application defenses and enable various attacks and impacts.
Using Components with Known Vulnerabilities
29
# Define this OWASP attack type: Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data.
Insufficient Logging & Monitoring
30
Where should server rooms be located in a building?
a. should be located in or near center of building b. should not be on ground floor if possible c. should not be on top floor if possible d. should not be in basement if possible e. should be away from water, gas, sewer runs if possible f. walls of space should have a MINIMUM fire rating of 1 hour
31
How many bits of keying material does the Data Encryption Standard use for encrypting information? A. 56 bits B. 64 bits C. 128 bits D. 256 bits
A. DES uses a 64-bit encryption key, but only 56 of those bits are actually used as keying material in the encryption operation. The remaining 8 bits are used to detect tampering or corruption of the key.
32
Which one of the following is not one of the basic requirements for a cryptographic hash function? A. The function must work on fixed-length input. B. The function must be relatively easy to compute for any input. C. The function must be one way.Your selection is incorrect D. The function must be collision free.
A. Hash functions must be able to work on any variable-length input and produce a fixed-length output from that input, regardless of the length of the input.
33
CC Evaluation Assurance Levels (EALs) EAL 1
Functionally tested
34
CC Evaluation Assurance Levels (EALs) EAL 2
Structurally tested
35
CC Evaluation Assurance Levels (EALs) EAL 3
Methodically tested & checked
36
CC Evaluation Assurance Levels (EALs) EAL 4
Methodically designed, tested, reviewed
37
CC Evaluation Assurance Levels (EALs) EAL 5
Semi-formally designed & tested
38
CC Evaluation Assurance Levels (EALs) EAL 6
Semi-formally verified, designed, & tested
39
CC Evaluation Assurance Levels (EALs) EAL 7
Formally verified, designed, tested
40
What does GPR (Ground Potential Rise) protect from?
Lightning Strikes
41
Whats an ideal temperature range?
60 - 75 degrees | 15 - 23 degrees Celsius
42
Whats an ideal humidity range?
40 - 60%
43
How many stages are there to a fire?
4 1. Incipient Stage 2. Smoke Stage 3. Flame Stage 4. Heat Stage
44
What is Class A Fire extinguishers used for and whats the suppression material?
Common Combustibles; Water and Soda Acid
45
What is Class B Fire extinguishers used for and whats the suppression material?
Liquids; C02, Halon Equivalent, soda acid
46
What is Class C Fire extinguishers used for and whats the suppression material?
Electrical; C02, Halon Equivalent
47
What is Class D Fire extinguishers used for and whats the suppression material?
Metal; Dry Powder
48
What are the 5 fire detection system types?
1. Fixed Temperature 2. Rate of rise detection 3. Flame Actuated 4. Smoke Actuated 5. Incipient smoke detection
49
What are the 4 types of water suppression system types?
wet pipes - Constant Water in them dry pipes - do no have water in them pre-action - incorporate a detection system deluge - another type of dry pipe except all sprinkler heads are in the open position.
50
What are the gas systems used in fire suppression?
a. FM-200 b. CEA-410 or CEA-308 c. Argon d. Aero-K
51
What are the goals of cryptography?
1. Confidentiality 2. Integrity 3. Authentication 4. Non repudiation
52
"A cryptosystem should be secure even if everything about the system, except the key, is public knowledge."
Kerckoffs Principle
53
How is logical operator "AND" also represented?
" ^ "
54
How is logical operator "OR" also represented?
" v "
55
How is logical operator "XOR" also represented?
" ⊕ "
56
How is logical operator "NOT" also represented?
" - " or " ! "
57
Modulo Function is defined as what?
Remainder left over AFTER a division operation has been performed. Example: 8 MOD 6 = 2 6 goes into 8 ONCE with TWO left over
58
easily produces output, but makes it impossible to retrieves the input values
One-Way Function
59
Ability to prove your knowledge of a fact to a third party WITHOUT revealing that fact to the third party. "Show but don't tell"
Zero knowledge proof
60
Cryptographic systems of symbols that represent words or phrases, but are not always secret & DO NOT provide confidentiality.
Codes
61
ALWAYS meant to hide the meaning of a transmitted message using a variety of techniques to achieve some measure of confidentiality.
Ciphers
62
Only TRULY UNBREAKABLE cryptosystem, but only if implemented correctly
One-Time pad (Vernam Cipher)
63
One of the earliest documented cipher systems, using substitution
Caeser Cipher
64
A method of encrypting alphabetic text by using a series of different Caeser ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.
Vigenere Cipher
65
Used in cases where the use of encryption is not necessary but yet the fact that no encryption is needed must be configured in order for the system to work.
Null Cipher
66
Sender and receiver agree on a key word, for example, pizza. A table is the constructed used that word and then the rest of the alphabet - skipping over the letters already appearing in the key and using I and J as the same letter.
Playfair Cipher
67
Which cryptographic algorithm uses only a SINGLE KEY?
Symmetric
68
Different encryption keys generate the same cipher text from the same plain text message
Key Clustering
69
DES , 3DES, IDEA, BLOWFISH , SKIPJACK and AES are all forms of what type of algorithm?
Symmetric
70
How many keys do you need with asymmetric algorithm and 4 participants?
6 Keys n ( n - 1 ) / 2 ....Where "n" is the number of participants
71
Used to be the standard for the symmetric encryption for many governments and militaries but no longer because it is considered compromised?
DES
72
How many bits is the KEY SPACE for DES?
56 bit key 8 bits are reserved for parity operations
73
How many bits is the KEY SPACE for 2-DES?
112 bit key
74
How many bits is the KEY SPACE for 3-DES?
168 bit key
75
How many rounds of XOR does DES use?
16 rounds Also may be referred to as "16 rounds of encryption"
76
How many bits is the BLOCK space that DES operates on?
64 bits
77
Which encryption algorithm contains the following: 64 bit block cipher and 128 bit key
IDEA
78
Which encryption algorithm contains the following: 64 bit block cipher and variable key from 32 to 448 bits
Blowfish
79
Which encryption algorithm contains the following: 64 bit block cipher and 80 bit key. Also has capability to use key escrow for encryption keys. Was considered the basis for the US governments attempt's at the clipper chip
Skipjack
80
Which encryption algorithm contains the following: 128 bit block cipher with variable keys from 128, 192 and 256
AES
81
What are the rounds that correspond with the following AES key lengths below: 128 bit key 192 bit key 256 bit key
128 bit key requires 10 rounds 192 bit key requires 12 rounds 256 bit key requires 14 rounds
82
What was the original name for the AES algorithm?
Rijndael Algorithm
83
Rijndael Algorithm (AES) consists of 4 major operations. What are those?
1. Substitute Bytes 2. Shift Rows 3. Mix Columns 4. Add Round Key
84
Which encryption algorithm contains the following: 64 bit block and keys between 40 and 128 bits in length. Rounds are 12 -16
CAST-128
85
Which encryption algorithm contains the following: 128 bit block with keys of 128, 192, 160, 224 and 256. Performs 48 rounds and is described in RFC2612
CAST-256
86
Which encryption algorithm contains the following: 128 bit block with keys up to 256 bits
TwoFish
87
Which encryption algorithm contains the following: Variable block size 32, 64, 128 and with key length of 0 to 2048 bits
RC-5 (RIVEST)
88
When implementing STREAM encryption. It is considered what?
synchronous
89
When implementing BLOCK encryption. It is considered what?
asynchronous
90
Secure holding facility for cryptographic key
key escrow
91
ALL cryptosystems have a limited lifespan based on their ability to withstand attacks
Cryptographic Lifecycle
92
Most famous asymmetric crypto system. Named for its creators: Rivest Shamir Adleman
RSA
93
Developed at approx same time as RSA and also based on difficulty of factoring but took different approach. Broken in 1984
Merkle-Hellman Knapsack
94
Based on an extension of the diffie-hellman algorithm published without a patent so its freely available.
El Gamal
95
Based on the elliptic curve discrete logarithm problem
ECC Elliptic Curve Cryptography
96
Take a message and mix it with a hash to derive a unique output value
hash function
97
RSA 5 basic requirments of a hash function
1. input can be of any length 2. output has fixed length 3. hash function is easy to compute for given input 4. hash function is "one-way"; almost impossible to figure out the input based on the output 5. hash function is collision free; almost impossible to find two messages that will produce the same hash value
98
What hashing algorithm uses the following: 160 bits using 512 bit block size for processing the message
SHA-160
99
What hashing algorithm uses the following: 224 bits using 512 bit block size for processing the message
SHA-224
100
What hashing algorithm uses the following: 256 bits using 512 bit block size for processing the message
SHA-256
101
What hashing algorithm uses the following: 384 bits using 1024 bit block size for processing the message
SHA-384
102
What hashing algorithm uses the following: 512 bits using 1024 bit block size for processing the message
SHA-512
103
Preferred hashing algorithm also known as Keccak Algorithm
SHA3
104
All of the following are considered what? HAVAL - bit= 128,60,192,224,256 MD2,4,5 - bit = 128 Hash Message Authentication Code (HMAC) - bit = Variable RIPEMD- bit = 160
Hashing Functions
105
Comprehensive system required to provide public-key encryption and digital signature services. It has three primary purpose: 1. Publish public keys/certs 2. Certify that the key is tied to individual or entity. 3. Provide verification of the validity of a public key.
PKI - Public Key Infrastructure
106
Protects the entire communication circuit by creating an encrypted tunnel between two end points, encrypting ALL OF THE DATA, including the header, trailer, address and routing info
Link Encryption Example: SSL/TLS
107
Protects communications between two parties and is performed independently of link encryption. Just encrypts the data payload itself, not any of the routing information, so it is quicker.
End-To-End Encryption Example: SSH
108
Most commonly used VPN protocol IP Traffic ONLY! 1. Authentication Header - Authentication, integrity and non-repudiation 2. ESP Encapsulating Security Payload - Confidentiality with limited authentication, Operates at Layer 3 and can be deployed in Transport or Tunnel Mode
IPSec IPSec must be deployed with AH and ESP!!!!
109
Provides security support in IPSec by negotiating, establishing, modifying and deleting security associations (SAs). Four Requirements Include: 1. Authenticate communicating peers 2. Create & Modify security associations 3. Provide key generation mechanisms 4. Protect against threats
ISAKMP - Internet Security Association and Key Management
110
Negotiated by ISAKMP during the initialization of an IPSec session. It Requires a simplex connection, or a "one-way" transmission agreement.
Security Association (SAs)
111
Algebraic manipulation attempting to reduce the complexity of the algorithim by focusing on the lofic of the algorthim
Analytic Attack
112
Exploitiung weakness in the way in th which the cryptosystem has been architechted and implemented
Implementation Attack
113
Exploits weakness such as floating point errors & an inability to produce truly random numbers
Statistical Attack
114
Attempting EVERY POSSIBLE combination until the right one is found. Ways to enhance this attack: a. Rainbow Tables b. Use of special hardware Ways to defeat: a. Salt the Passwords b. pepper c. Key stretching
Brute Force Attack