Domain 3 - Security Architecture and Engineering Flashcards
Define Brewer-Nash model
The Brewer-Nash model allows access controls to change dynamically based upon a user’s actions.
What is the “ m of n “ control?
Harry would like to retrieve a lost encryption key from a database that uses m of n control, with m = 4 and n = 8. What is the minimum number of escrow agents required to retrieve the key?
In an m of n control system, at least m of n possible escrow agents must collaborate to retrieve an encryption key from the escrow database.
Digital signatures that are approved part of the federal Digital Signature Standard under FIPS 186-4
RSA
ECDSA
DSA
Another term for sandbox
Confinement
_______ is the degree of confidence that an organization has that its security controls are correctly implemented. It must be continually monitored and reverified.
A Trust
B Credentialing
C Verification
D Assurance
D.
Assurance is the degree of confidence that an organization has that its security controls are correctly implemented. It must be continually monitored and reverified.
Define Maintenance Hook
Maintenance hooks, otherwise known as backdoors, provide developers with easy access to a system, bypassing normal security controls. If not removed prior to finalizing code, they pose a significant security vulnerability if an attacker discovers the maintenance hook.
Define Biba model (two) attributes
a. Simple Integrity Property NO READ DOWN
b. *(star) Integrity Property NO WRITE UP
INTEGRITY ONLY!!NO READ DOWN, NO WRITE UP**
Define Bell-LaPadula model attributes
a. Simple Security Property. NO READ UP! Example: Secret cannot read up to TOP Secret
b. *(star) Security Property. NO WRITE DOWN Example: Moving TOP SECRET data to Secret level
CONFIDENTIALITY of DATA ONLY!!NO READ UP, NO WRITE DOWN**
Define Clark-Wilson model attributes
a. Preventing unauthorized users from making modifications to data or programs
b. Preventing authorized users from making improper or unauthorized modifications
c. Maintaining internal and external consistency of data and programs
INTEGRITY ONLY!!SUBJECT|PROGRAM|OBJECT**
What does TPM hardware restrict users from doing?
Prevents someone from accessing an encrypted drive by installing it in another computer.
Definition: Trusted Platform Module (TPM) is a hardware security technique that stores an encryption key on a chip on the motherboard
Asymmetric cryptosystem
sender of a message always encrypts the message using the recipient’s public key.
Recipient decrypts with recipients private key
Sender creates digital signature using sender private key. Recipient verifies signature using sender public key
What is a “salt” in terms of passwords?
salt is a random value added to a password before it is hashed by the operating system
What type of fire suppression system fills with water when the initial stages of a fire are detected and then requires a sprinkler head heat activation before dispensing water?
A. Wet Pipe
B. Dry Pipe
C. Deluge
D. Preaction
D.
A preaction fire suppression system activates in two steps. The pipes fill with water once the early signs of a fire are detected. The system does not dispense water until heat sensors on the sprinkler heads trigger the second phase.
What IPSEC configuration provides confidentiality for the content of packets?
ESP
Encapsulating Security Payload (ESP) protocol provides confidentiality and integrity for packet contents. It encrypts packet payloads and provides limited authentication and protection against replay attacks.
What are the 5 defining characteristics of cloud based technologies?
- On demand self service
- Broad Network Access
- Resource Pooling
- Rapid Elasticity
- Measured Service
What are the 3 cloud service models that everyone agrees on?
- SAAS (Software as a service)
- PAAS (Platform as a Service)
- IAAS (Infrastructure as a Service)
What are the four cloud deployment models?
- Private
- Community (Private cloud within Private
Cloud) - Public (World Wide Web)
- Hybrid (Mix of two or more of above)
Define Type I Hypervisor
Native Bare Metal
Example: eSXI, HYPER V
Define Type II Hypervisor
Hosted on a client O/S
Example: Virtual Box, Parallels. Application that runs on top of OS that provides virtualization
Define this OWASP attack type:
When un-trusted data is sent to an interpreter as part of a command query.
Injection.
SQL, NOSQL, OS, LDAP
Define this OWASP attack type:
Application functions related to authentication and session management are often implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities temporarily or permanently.
Broken Authentication
Attackers may steal or modify weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browser.
Sensitive Data Exposure
Define this OWASP attack type:
Many older or poorly configured XML processors evaluate external entity references within XML documents. External entities can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks.
XML External Entities (XXE)
Applications and in particular XML-based web services or downstream integrations might be vulnerable to attack if:
• The application accepts XML directly or XML uploads, especially from
untrusted sources, or inserts untrusted data into XML documents, which is then parsed by an XML processor.
• Any of the XML processors in the application or SOAP based web services has
document type definitions (DTDs) enabled. As the exact mechanism for disabling DTD processing varies by processor, it is good practice to consult a reference such as the OWASP Cheat Sheet ‘XXE Prevention’.
• If your application uses SAML for identity processing within federated
security or single sign on (SSO) purposes. SAML uses XML for identity assertions, and may be vulnerable.
• If the application uses SOAP prior to version 1.2, it is likely susceptible
to XXE attacks if XML entities are being passed to the SOAP framework.
Define this OWASP attack type:
Restrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can exploit these flaws to access unauthorized functionality and/or data, such as access other users’ accounts, view sensitive files, modify other users’ data, change access rights, etc…
Broken Access Control