Domain 3 - Security Engineering Flashcards

1
Q

DES

A

Data Encryption Standard

  • 64 bit blocks of text
  • 64 bit key, 8 bits for parity
    • EFFECTIVE KEY LENGTH is 56 bits
    • TOTAL KEY LENGTH is 64 bits
  • Since DES uses BLOCK size of 64, result is still 64 bits of encrypted data even though effective key size is 56 bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DES - EFFECTIVE key length

A

56 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES - TOTAL key length

A

64 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard

  • Sequences of 128-bit blocks
  • Cipher key can be 128, 192, 256 bits
  • AES-128, AES-192, AES-256
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bell-LaPadula

A

MANDATORY ACCESS CONTROL

  • CONFIDENTIALITY
  • Simple Security Property (NRU)
    • Security Property (NWD)
  • Strong Tranquility Property
  • Weak Tranquility Property
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bell-LaPadula - Simple Security Property

A

No Read Up (NRU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bell-LaPadula - * Security Property

A

No Write Down (NWD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bell-LaPadula - Strong Tranquility Property

A

The security label will not change when the system is operating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bell-LaPadula - Weak Tranquility Property

A

The security label will not change in a way that conflicts with defined security properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Biba

A

INTEGRITY

  • Simple Integrity Axiom
    • Integrity Axiom
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Biba - Simple Integrity Axiom

A

No Read Down (NRD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Biba - * Integrity Axiom

A

No Write Up (NWU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Clark-Wilson

A

INTEGRITY

  • Separation of Duties (SoD)
  • Well-formed transactions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Clark-Wilson - “Access Control Triple”

A

TP - Transaction Procedure (well formed transaction)
CDI - Constrained Data Item (data that requires integrity)
UDI - Unconstrained Data Item (data that does not require integrity)
IVP - Integrity Verification Procedures (ensures data is kept in a valid state)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Clark Wilson - Transaction Procedure

A

Well-formed transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Clark Wilson - Constrained Data Item

A

Data that requires integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Clark Wilson - Unconstrained Data Item

A

Data that does not require integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Clark Wilson - Integrity Verification Procedures

A

Ensures that data is kept in a valid state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Information Flow Model

A

Uses a lattice
Objects are labeled with security CLASSES
Information can flow either upward or at the same level
Both Bell-LaPadula AND Biba use the Information Flow Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Reading Down and Writing Up

A

Applies to Bell-LaPadula

NRU/NWD are the opposite of this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

State Machine Model

A

Mathematical model that groups all possible system occurrences
Occurrences are called STATES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Chinese Wall Model

A

Designed to avoid CONFLICTS OF INTEREST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Chinese Wall Model - CoI’s

A

CoI’s = Conflict of Interest categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Noninterference

A

Ensures data in different security domains remains separate from one another
Prevents covert channels
Each data access attempt is independent from others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Take-Grant

A

Contains rules that govern the interactions between subjects and objects, including permissions subjects can grant to other subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Take-Grant - Four Rules

A

Take, Grant, Create, Remove

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

TCSEC

A

Trusted Computer System Evaluation Criteria (TCSEC)
NIST and NCSC (National Computer Security Center)
AKA Orange Book
DOES NOT address networks. Systems only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

TCSEC/Orange Book - Divisions

A

D: Minimal Protection
C: Discretionary Protection (C1, C2)
B: Mandatory Protection (B1, B2, B3)
A: Verified Protection (A1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

TNI/Red Book

A

Trusted Network Interpretation

Brings TCSEC concepts to network systems

30
Q

ITSEC

A

European Information Technology Security Evaluation Criteria (ITSEC)
European version of the Orange Book

31
Q

Information Common Criteria

A

Successor to ITSEC
“Target of Evaluation” and “Security Target”
PRIMARY OBJECTIVE: Eliminate known vulnerabilities of the target for testing

32
Q

Layering

A

Separates hardware and software functionality into modular tiers
One layer is not directly affected by a change to another

33
Q

Abstraction

A

Hides unnecessary details from the user

Makes processes LESS COMPLEX to ENHANCE security

34
Q

Security Domains

A

A list of objects that a subject is allowed to access
DOD - Confidential, Secret, Top Secret
Kernels - User mode, Kernel mode

35
Q

The Ring Model

A

Separates and protects domains (ex: kernel/user mode) from each other

36
Q

The Ring Model - Ring 0

A

Kernel - MOST trusted

37
Q

The Ring Model - Ring 1

A

Other OS components

38
Q

The Ring Model - Ring 2

A

Device Drivers

39
Q

The Ring Model - Ring 3

A

User - LEAST trusted

40
Q

The Ring Model - Ring -1

A

Hypervisor Mode

41
Q

DEP

A

Data Execution Prevention

  • Can be enabled within hardware and/or software
  • Attempts to ensure that memory locations not PRE-DEFINED to contain executable content will not have the ability to have code executed
  • Protects against STACK/HEAP-based buffer overflows
42
Q

ASLR

A

Address Space Layout Randomization

- Makes memory addresses employed by the system less predictable

43
Q

CPU - Multitasking

A

Allows multiple tasks to run simultaneously on one CPU

Most modern OS’s support multitasking

44
Q

CPU - Multiprocessing

A

Runs multiple processes on multiple CPIs

45
Q

CPU - Multiprocessing - SMP

A

Symmetric Multiprocessing

- One operating system to manage all CPUs

46
Q

CPU - Multiprocessing - AMP

A

Asymmetric Multiprocessing

- One OS system image per CPU, acting as independent systems

47
Q

Swapping vs Paging

A
Swapping = copying ENTIRE process to or from disk
Paging = copying BLOCKS of memory to or from disk
48
Q

WORM (memory)

A

Write Once Read Many

49
Q

Infrastructure as a Service (IaaS)

A

Provides an entire virtualized OS

Customer configures from the OS on up

50
Q

Platform as a Service (PaaS)

A

Provides a pre-configured OS

Customer configures applications, then just uses the applications

51
Q

Software as a Service (SaaS)

A

Completely configured solution from the OS to the applications
think: O365, Dropbox, etc…

52
Q

Covert Storage Channel

A

Uses shared storage, such as a temporary directory, to allow two subjects to signal eachother

53
Q

Covert Timing Channel

A

Relies on the system clock to infer sensitive information

54
Q

Overt Channel

A

Opposite of a covert channel.

Authorized communication that complies with security policy

55
Q

Macro Virus

A

Written in a macro language

56
Q

Boot Sector Virus

A

Infects the boot sector of a PC

Ensures that the virus loads upon system startup

57
Q

Stealth Virus

A

hides itself from the OS and AV

58
Q

Polymorphic Virus

A

Changes its signature upon infection of a new system

Attempts to evade AV

59
Q

Multiparte Virus

A

Spreads via multiple vectors

60
Q

Server-side Attack

A

Launched directly from the attacker to a listening service

61
Q

Client-side Attack

A

User downloads malicious content

Firewalls often fail to prevent these attacks

62
Q

Client-side Attack Mitigations

A

Patching applications

User Awareness

63
Q

Server-Side Attack Mitigations

A

Firewalls
Patching
System hardening
Defense in depth

64
Q

Inference

A

There is a mystery to be solved
Lower level details provide CLUES to DEDUCE higher level information
POLYINSTANTIATION can help defend against inference

65
Q

Aggregation

A

Mathematical process
User asks every questions and receives every answer, then can derive restricted information
NO DEDUCTION IS REQUIRED (answer is given)

66
Q

Cryptology

A

The science of secure communication

Encompasses BOTH cryptography and cryptanalysis

67
Q

Cryptography

A

Creates messages whose meaning is hidden

68
Q

Cryptanalysis

A

The science of breaking encrypted messages

69
Q

Diffusion (encryption)

A

The order of the plaintext should be “diffused” in the ciphertext

70
Q

Confusion (encryption)

A

The relationship between the plain/ciphertext should be as confused (random) as possible

71
Q

Substitution (encryption)

A

Replaces one character for another

Provides CONFUSION

72
Q

Permutation (encryption)

A

Also called transposition

Provides diffusion by rearranging the characters of the plaintext, anagram style