Domain 3 - Security Engineering Flashcards
What is the simultaneous execution of more than one
application on a computer and is managed by the operating system.
Multitasking
This permits multiple concurrent tasks to be performed within a single process.
Multithreading
The use of more than one processor to increase computing power.
Multiprocessing
Similar to multitasking but takes place on mainframe systems and requires specific programming.
Multiprogramming
Processors that are capable of operating at only one security level at a time,
Single state processors
Processors that can simultaneously operate at multiple security levels.
Multistate processors
What are the four security modes approved by the federal government for processing classified information.
Dedicated systems - require that all users have appropriate clearance, access permissions, and need to know for all information stored on the system.
System high mode - removes the need-to-know requirement.
Compartmented mode - removes the need-to-know requirement and the access permission requirement. Multilevel mode - removes all three requirements.
The two layered operating modes used by most modern processors.
User mode and Privileged mode
User applications operate in a limited instruction set environment
User mode
The operating system performs controlled operations
Privileged mode
Nonvolatile memory that can’t be written to by the end user or PC
Read only memory (ROM)
Similar to a ROM chip in functionality, but with one exception; special functionality
that allows an end user to burn in the chip’s contents later. However once it is burned in no further changes are possible
Programmable Read-Only Memory (PROM)
Memory chips that may be erased through the use of ultraviolet light and then can have new data written to
them.
Erasable Programmable Read-Only Memory (EPROM)
Memory chips may be erased with electrical current and then have new data written to them.
Electronically Erasable Programmable Read-Only Memory (EEPROM)
Memory chips that are volatile and lose their contents when the computer is powered off.
Random Access Memory (RAM)
A limited amount of memory that is included in the CPU that provide it with directly accessible memory locations that the brain of the CPU, the arithmeticlogical unit (ALU), uses when performing calculations or processing instructions.
Registers
At the computer level, it contains the basic instructions needed to start a computer. It is also used to provide operating instructions in peripheral devices such as printers.
Firmware
This ensures that individual processes can access only
their own data.
Process isolation
This creates different realms of security within a process and limits
communication between them.
Layering
This creates “black-box” interfaces for programmers to use without requiring knowledge of an algorithm’s or device’s inner workings.
Abstraction
This prevents data from being discovered or accessed by a subject by positioning it in a location that is not seen by the subject.
Data hiding
Enforces process isolation with physical controls.
Hardware segmentation
The role of a _____ ______ is to inform and guide the design, development, implementation, testing, and maintenance of some particular system.
Security Policy
The popular term referring to a concept of computing where processing and storage are performed elsewhere over a network connection rather than locally. It is often thought of as Internet-based computing.
Cloud computing