Domain 3 - Security Engineering Flashcards
What is the simultaneous execution of more than one
application on a computer and is managed by the operating system.
Multitasking
This permits multiple concurrent tasks to be performed within a single process.
Multithreading
The use of more than one processor to increase computing power.
Multiprocessing
Similar to multitasking but takes place on mainframe systems and requires specific programming.
Multiprogramming
Processors that are capable of operating at only one security level at a time,
Single state processors
Processors that can simultaneously operate at multiple security levels.
Multistate processors
What are the four security modes approved by the federal government for processing classified information.
Dedicated systems - require that all users have appropriate clearance, access permissions, and need to know for all information stored on the system.
System high mode - removes the need-to-know requirement.
Compartmented mode - removes the need-to-know requirement and the access permission requirement. Multilevel mode - removes all three requirements.
The two layered operating modes used by most modern processors.
User mode and Privileged mode
User applications operate in a limited instruction set environment
User mode
The operating system performs controlled operations
Privileged mode
Nonvolatile memory that can’t be written to by the end user or PC
Read only memory (ROM)
Similar to a ROM chip in functionality, but with one exception; special functionality
that allows an end user to burn in the chip’s contents later. However once it is burned in no further changes are possible
Programmable Read-Only Memory (PROM)
Memory chips that may be erased through the use of ultraviolet light and then can have new data written to
them.
Erasable Programmable Read-Only Memory (EPROM)
Memory chips may be erased with electrical current and then have new data written to them.
Electronically Erasable Programmable Read-Only Memory (EEPROM)
Memory chips that are volatile and lose their contents when the computer is powered off.
Random Access Memory (RAM)
A limited amount of memory that is included in the CPU that provide it with directly accessible memory locations that the brain of the CPU, the arithmeticlogical unit (ALU), uses when performing calculations or processing instructions.
Registers
At the computer level, it contains the basic instructions needed to start a computer. It is also used to provide operating instructions in peripheral devices such as printers.
Firmware
This ensures that individual processes can access only
their own data.
Process isolation
This creates different realms of security within a process and limits
communication between them.
Layering
This creates “black-box” interfaces for programmers to use without requiring knowledge of an algorithm’s or device’s inner workings.
Abstraction
This prevents data from being discovered or accessed by a subject by positioning it in a location that is not seen by the subject.
Data hiding
Enforces process isolation with physical controls.
Hardware segmentation
The role of a _____ ______ is to inform and guide the design, development, implementation, testing, and maintenance of some particular system.
Security Policy
The popular term referring to a concept of computing where processing and storage are performed elsewhere over a network connection rather than locally. It is often thought of as Internet-based computing.
Cloud computing
Typically designed around a limited set of specific functions in relation to the larger product of which it’s a component.
Embedded System
Applications, OSs, hardware sets, or networks that are confi gured for a specifi c need, capability, or function, and then set to remain unaltered.
Static environments
Ensures that only a minimum number of processes are authorized to run in supervisory mode.
Principle of lease privilege
Any method that is used to pass information but that is not normally used for information.
Covert Channels
This occurs when the programmer fails to check the size of input data prior to writing the data into a specific memory location.
Buffer Overflow
Checking data before it is saved to a database
Input checking
An engineering discipline concerned with the design and construction of computing systems at a logical level.
Computer architecture
From a security standpoint, _____ _____ organize code and components in an operating system (as well as applications, utilities, or other code that runs under the operating system’s control) into concentric rings. The deeper inside the circle you go, the higher the privilege level associated with the code that occupies a specific ring.
Protection rings
This is not a memory addressing scheme perse but rather a way of referring to data that is supplied to the CPU as part of an instruction.
Immediate addressing
In this memory addressing scheme, the CPU is provided with an actual address of the memory location to access.
Direct addressing
In this scheme the memory address supplied to the CPU as part of the instruction doesn’t contain the actual value that the CPU is to use as an operand. Instead, the memory address contains another memory address
Indirect addressing
This contains the operating system–independent primitive instructions that a computer needs to start up and load the operating system from disk.
BIOS
Database attack where attacker collects details at lower level to determine information at a higher level.
Aggregation
Combining several pieces of nonsensitive information to gain access to information that should be classified at a higher level. Requires some level of deduction.
Inference
Facility construction and selection, site management, personnel controls, awareness training, and emergency response and procedures are all examples of what?
Administrative Physical security controls
Access controls, intrusion detection, alarms, CCTV, monitoring, HVAC, power supplies, and fire detection and suppression are all examples of what?
Technical physical security controls
Fencing, lighting, locks, construction materials, mantraps, dogs, and guards are all examples of what?
Physical controls for physical security
What are the key elements in making a site selection?
Visibility, composition of the surrounding area, area accessibility, and the effects of natural disasters.
What is the key element in designing a facility for construction?
Understanding the level of security needed by your
organization and planning for it before construction begins.
Name the three categories of security controls implemented to manage physical security
administrative, technical, and physical
Using someone else’s security ID to gain entry to a facility
Masquerading
Following someone through a secured gate or doorway without being identified or authorized personally.
Piggybacking
Ideal temperature for a computer room
60 to 75 degrees Fahrenheit
Ideal Humidity for a computer room
between 40 and 60 percent
A systematic effort to identify relationships between mission-critical applications, processes, and operations and all the necessary supporting elements.
Critical path analysis
The tendency for various technologies, solutions, utilities, and systems to evolve and merge over time.
Technology convergence
This clearly defines the response time a vendor will provide in the event of an equipment failure emergency.
service-level agreement (SLA)
The expected typical functional lifetime of the device given a specific operating environment.
mean time to failure (MTTF)
The average length of time required to perform a repair on the device.
mean time to repair (MTTR)
A box, mobile room, or entire building designed with an
external metal skin, often a wire mesh that fully surrounds an area on all sides (in other words, front, back, left, right, top, and bottom).
Faraday cage
A momentary loss of power
Fault
A complete loss of power
Blackout
Momentary low voltage
Sag
Prolonged low voltage
Brownout
Momentary high voltage
Spike
Prolonged high voltage
Surge
An initial surge of power usually associated with connecting to a power source, whether primary or alternate/secondary
Inrush
A steady interfering power disturbance or fluctuation
Noise
A short duration of line noise disturbance
Transient
Nonfluctuating pure power
Clean
The wire in an electrical circuit that is grounded
Ground
Class A fire extinguishers can be used on what? And what is the suppression material used?
Common combustibles; Water, soda acid (a dry powder
or liquid chemical)
Class B fire extinguishers can be used on what? And what is the suppression material used?
Liquids; CO2 , halon (or EPA approved halon substitue), soda acid
Class C fire extinguishers can be used on what? And what is the suppression material used?
Electrical; CO2 , halon (or EPA approved halon substitue)
Class D fire extinguishers can be used on what? And what is the suppression material used?
Metal; Dry powder
This suppression system is always full of water. Water
discharges immediately when suppression is triggered.
Wet Pipe System