Domain 3: Security Engineering Flashcards

1
Q

Ceaser Cipher

A

substitution cipher, shift 3 letters to the right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Four Fundamental Goals of Cryptography

A

Confidentiality, Integrity, Authentication, Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key space

A

defined by bit size. a 128 bit key has a value from 0 to 2^128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Kerchoff Principle

A

a cryptographic system should be secure even if everything about the system, except the key, is public knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptovariables

A

cryptographic keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Crptography

A

the art of creating and implementing secret codes and ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptanalysis

A

the study of methods to defeat codes and ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptology

A

Cryptography + Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Boolean mathematics

A

defines rules used for bits and bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

modulo function

A

remainder after division

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One- way function

A

operation that easily produces output values for each possible combinations of input but makes it impossible to reverse engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Nonce

A

random number that acts as a placeholder variable, must be random and used one time only ex: Initialization Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IV

A

Initialization Vector - a random bit string as long as the block that is XORed with the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zero-knowledge proof

A

The magic door - watch someone go in one entrance and come back before buying their password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Work function

A

time and effort required to perform a complete brute-force attack, directly proportional to the security and protection of the crytosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Difference between Codes and Ciphers

A

codes are not meant to provide confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Transposition Ciphers

A

rearrange the letters of the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Substitution Cipher

A

replace each bit of plaintext with a different character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ceaser Cipher encryption function

A

C = (P+3) mode 26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Vigenere Cipher

A

polyalphabetic - alphabet written 26 times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Period Analysis

A

examination of frequency based on the repeated use of the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

One-Time Pads

A

substitution cipher, use a different substitution alphabet for each letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

One-Time Pad encryption function

A

C = (P+K) mod 26, K = key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

One-Time Pad Security Requirements (4)

A

Random, used once, physically protected, as long as the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Running Key or Book Cipher

A

key is as long as the message itself and is often from a book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Block Ciphers

A

operate on chunks of messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Steam Cipher

A

act on on bit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Confusion

A

relationship btwn plaintext and ciphertext is so complicated that an attacker can’t determine the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Diffusion

A

a change in the plaintext results in multiple changes spread through the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Symmetric Key Algorithm Pros and Cons

A

Pro - Very Fast, used for bulk encryption

Cons - key distribution, does not implement non repudiation, not scalable, keys must be regenerated often

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Symmetric Key Algorithm

A

relies on a shared key given to all members used to encrypt and decrypt, aka secret key and private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Asymmetic Key Algorithm

A

public key, each user has a public and private key, receivers public key encrypts, receivers private key decrypts, also digital signature tech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Asymmetic Key Algorithm Pros and Cons

A

Pros - adding new users only requires 1 public-private key pair, easier to remove users, less key regeneration, provides integrity, authentication, nonrepudiation, key distribution is easy, no preexisting relationship is necessary
Cons - speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
Which key algorithm?
Single shared key vs key pair
Confidentiality, Integrity, Nonrepudiation, authentication vs Confidentidality
Slow vs Fast
Non Scalable vs Scalable
In-Band vs Out of band exchange
Bulk encyrption vs small blocks of data
A
Symmetic = Single shared key, Confidentidality, Fast, Non Scalable, Out of band exchange, Bulk encyrption
Asymmetric = Key pair, Confidentiality, Integrity, Nonrepudiation, authentication, Slow, Scalable, In-Band, Small blocks of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Message Digest

A

Summary of a messages content produced by hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Hashing provides ____

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

DES

A

Data Encryption Standard - no longer secure, 64 bit block cipher with 5 modes of operation, key is 56 bits, uses 16 rounds of XOR operations to generate ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Symmetric Standards

A

DES, 3DES, IDEA, Blwofish, Skipjack, AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

DES Modes of Operation

A

Cipher Block Chaining Mode, Cipher Feedback Mode, Output Feedback Mode, Counter Mode, Electronic Codebook Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

ECB

A

Electronic Codebook mode - least secure, simply encrypts block with same key, enemy could build a code book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

CBC

A

Cipher Block Chaining Mode - each block is XORed with the ciphertext block proceeding it before encyrption, IV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

CFB

A

Cipher Feedback Mode - streaming cipher version of CBC, real time operation, IV and chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

OFB

A

Output Feedback Mode - same as CFB but XORs with a seed value, no chaining, uses previous seed value to determine next

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

CTR

A

Counter Mode - stream cipher, uses a counter for XOR operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

3DES

A

Triple DES - adapted version of DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

3DES Versions

A

DES - EEE3 = 168 bit key length
DES - EDE3 = 168 bit key length
DES - EEE2 = 112 bit key length
DES - EDE2 = 112 bit key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

DES-EEE3

A

encrypts plaintext 3 times using 3 different keys,

C= E (K1, E (K2, E (K3,P)))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

DES-EDE3

A

C= E (K1, D (K2, E (K3,P)))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

DES-EEE2

A

C= E (K1, E (K2, E (K1,P)))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

DES-EDE2

A

C= E (K1, E (K2, E (K1,P)))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

IDEA

A

International Data Encryption Algorithm = 64-bit block with 128 bit key, uses 52 16-bit subkeys, open to all, in PGP, same modes as DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Blowfish

A

64 bit blocks of text, allows use of variable length keys ranging from 32 to 448 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Skipjack

A

64 bit block, supports escrow of encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

AES

A

Advanced Encryption Standard - 3 key strengths, 128 bit (10 round of encryption), 192 bit (12 rounds), 256 bit (14 rounds). Processes 128 bit blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
Block Size and Key Size:
AES
Rijndael
Blowfish
DES
IDEA
RC2
RC4
RC5
Skipjack
3DES
Twofish
A
Block size and key size
AES = 128 bit block, 128, 192 or 256 bit key
Rijndael = Variable block, 128, 192 or 256 bit key 
Blowfish = 64 bit block, 32-338 bit key
DES = 64 bit block, 56 bit key
IDEA = 64 bit block, 128 bit key
RC2 = 64 bit block, 128 bit
RC4 = Streaming, 128 bit
RC5 = 32, 64 or 128 bit block, 0-2040 bit key
Skipjack = 64 bit block, 80 bit key
3DES = 64 bit block, 112 or 168 bit key
Twofish = 123 bit, 256 bit key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Three Main methods to distribute Symmetric Keys

A

Offline distribution, Public key encryption, Diffie-Hellmen Key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Fair Crytosystems Key Escrow

A

key is divided into two or more pieces and given to independent third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Escrow Encryption Standard Key Escro

A

provides gov’t with technical means to decrypt ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

RSA

A

Most famous asymmetric algorithm - depends on the difficulty of factoring large prime numbers, key length of 1088 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

El Gamal

A

asymmetric encryption, doubles the length of any message it encrypts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Asymmetric Key Algorithms

A

RSA, El Gamal, Elliptic Curve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Elliptic Curve

A

more difficult to solve, only 160 bit kit equivalent to 1088 RSA key. Good for small devices with less processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Hash Functions

A

take a long message and generate a unique output known as the message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

5 Requirements for a Cryptographic Hash Function

A
  1. Input can be any length
  2. Output has a fixed length
  3. Hash Function in relatively easy to compute
  4. Hash Function is one-way
  5. Hash Function is collision free
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

SHA

A

Secure Hashing Algorithm, SHA 2 is the most secure
SHA-1 = 512 bit blocks, 160 bit message digest
SHA-256 = 512 bit blocks, 256 bit message digest
SHA-224 = 512 bit blocks, 224 bit message digest
SHA-512 = 1024 bit blocks, 512 bit message digest
SHA-382 = 1024 but blocks, 834 bit message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

MD2

A

no longer used, 128 bit message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

MD4

A

message padded to be 64 bits smaller than 512 bit multiple, 3 rounds of computation, 128 bit message digest, no longer used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

MD5

A

512 bit blocks, same padding as MD4, reduce the speed, no longer secure, 128 bit message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Goals of Digital Signatures

A

Nonrepudiation and Integrity and Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

How to Digitally sign

A

Alice hashes plaintext, encrypt message digest using her private key (this is the digital signature), Append signed message digest to plaintext message, Send to Bob, Bob decrypts digital signature using Alice’s Public Key, Bob hases the plaintext message, Bob compares the decrypted message digest to his message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

HMAC

A

Hashed Message Authentication Code implements a partial digital signature, integrity but not non repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

DSS

A

Digital Signature Standard - by NIST, aka FIPS 186-4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Certificates

A

provide communicating parties with the assurance that the people they are communicating with are who they claim to be - endorsed copies of an individuals public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Certificate Authority

A

neutral organization which offer notarization services for digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Enrollment

A

the process of proving your identity to the CA to obtain a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

CRL

A

certificate revocation list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

OCSP

A

Online Certificate Status Protocol - eliminates latency of CRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Asymmetric Key Management

A

Choose encryption system wisely, select keys wisely, keep your private key secret, retire old keys, back up your key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

If your email needs confidentiality, _________

A

encrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

If your email needs integrity, ___________

A

hash the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

If your email needs authentication, integrity, and/or nonrepudiation

A

digitally sign the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

If your email needs confidentiality, integrity, authentication, and nonrepudiation

A

encrypt and digitally sign the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

PGP

A

Pretty Good Privacy is a secure email system combining CA concept with web of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

S/MIME

A

Secure Multipurpose Internet Mail Extensions - de factor standard for encrypted email, uses RSA and X.509 certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Steganography

A

embed secret messages within another message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

DRM

A

Digital Rights Management - uses encryption to enforce copyright restrictions on digital media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Link Encryption

A

used to protect data in transit - protects entire communication circuits by creating a secure tunnel between two points, encrypts header info so you need to decrypt at points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

End to End Encryption

A

used to protect data in transit - protects comms between two parties, more susceptible to eavesdroppers, faster, does not encrypt header info, ex: TLS, Banking, VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

IPsec

A

provides a complete infrastructure for secured network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

IPsec AH

A

Authentication Header - provides assurances of message integrity and nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

IPsec ESP

A

Encapsulating Security Payload - provides confidentiality and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

ISAKMP

A

Internet Security Association and Key Management Protocol - provides background security support services for IPsec by negotiating, establishing, modifying, and deleting SAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Two modes of IPsec

A

Transport mode - only packet is encrypted

Tunnel mode - entire packet is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Security Association

A

created to set up IPsec, represents the communication session and records any config and status info about the session, need one SA for each direction of data flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

WEP

A

Wired Equivalent Privacy - protect comms within wireless LAN, outdates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

WPA

A

WiFi Protected Access, improves on WEP by implementing Temporal Key Integrity Protocol, outdated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

WPA

A

adds AES cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Analytical Attack

A

algebraic manipulation that attempts to reduce the complexity of the algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Implementation Attack

A

exploits weaknesses in implementation, focus on sw code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Statistical Attack

A

focuses on inability to produce totally random numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Frequency Analysis and the Ciphertext Only Attack

A

uses known letter frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Known Plaintext Attack

A

Attacker has a copy of the plaintext and ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Chosen Ciphertext

A

attacker has ability to decrypt chosen portion of the ciphertext

104
Q

Chosen Plaintext

A

attacker has the ability to encrypt plaintext messages

105
Q

Meet in the Middle Attack

A

attacker uses a known plaintext and encypts, decrypts equivalent ciphertext and finds which keys match up

106
Q

Man in the Middle Attack

A

attacker sits between two communication parties and intercepts communications

107
Q

Birthday attack

A

finds flaws in one to one nature of hasing

108
Q

Replay Attack

A

attacker intercepts message and later replays it to start a new session

109
Q

Confinement

A

allows a process to read from and write to only certain memory location and resources aka sandboxing

110
Q

Bounds

A

limits set on the memory addresses and resources it can access

111
Q

Isolation

A

a process is confined through enforcing access bounds

112
Q

Controls

A

uses access rules to limit the access of a subject to an object

113
Q

Trusted System

A

a system in which all protection mechanisms work together to process sensitive data for many types of users while maintaining a stable and secure computing environment

114
Q

Assurance

A

the degree of confidence in satisfaction of security needs

115
Q

Security Model

A

gives software designers something against which to measure their design and implementation

116
Q

Trusted Computing Base

A

a combination of hw, sw and controls that work together to enforce your security policy, provide methods to access resources inside and outside TCB

117
Q

Security Perimeter

A

an imaginary boundary that separated the TCB from the rest of the system, prevents insecure comms, need trusted paths for secure comms

118
Q

Reference Monitor

A

part of the TCB that validates access to every resource prior to granting access requests

119
Q

Security Kernel

A

collection of components in the TBC that work together to implement reference monitor functions

120
Q

State Machine Model

A

a system that is always secure no matter what state it is in

121
Q

Information Flow Model

A

designed to prevent unauthorized, insecure, or restricted information flow

122
Q

Noninterference Model

A

loosely based on information flow, concerned with how the actions of a subject at a higher security level affect the system state of the actions of a subject at a lower security level

123
Q

Take-Grant Model

A

shows how rights can be passed from one subject to another or from a subject to an object

124
Q

Access Control Matrix

A

table of subjects and objects that indicated the actions or functions that each subject can perform on each other

125
Q

Bell-LaPadula Model

A

No read up, No write down, enforced through DAC, confidentiality is upheld

126
Q

Biba Model

A

No read down, no write up, Integrity is up held

127
Q

Clark-Wilson Model

A

objects can only be accessed through an interface

128
Q

Brewer and Nash (Chinese Wall)

A

blocks conflicting data/access based on competition

129
Q

Goguen-Meseguer Model

A

subjects are allowed only to perform predetermined actions against predetermined objects

130
Q

Sutherland Model

A

prevents interference in support of integrity, defines states

131
Q

Graham-Denning Model

A

secure creation and deletion of both subjects and objects

132
Q

TCSEC or Rainbow Series

A

set of standards that attempted to specify minimum acceptable security criteria

133
Q

ITSEC

A

European Model, more focused on integrity and availability

134
Q

TCSEC Categories

A

A = Verified Protection (all phases of development are evaluated), B= Mandatory Protection (security labels, Bell La-Padula Model), C = Discretionary Protection (basic controls and complete documentation), D = Minimal Protection

135
Q

Red Book

A

TCSEC for networks

136
Q

Green Book

A

password creation and management guidelines

137
Q

Common Criteria

A

global effort to validate products,

138
Q

Structure of Common Criteria

A

Part 1: Intro and General Model
Part 2: Security Functionality Requirements
Part 3: Security Assurance

139
Q

CC Evaluation Assurance Levels (EAL 1- EAL 7)

A

EAL1 - Functionally Tested
EAL2 - Structurally Tested
EAL3 - Methodically Tested and Checked
EAL4 - Methodically Designed, Tested and Reviewed
EAL5 - Semi-formally Designed and Tested
EAL6 - Semi-formally Verified, Designed and Tested
EAL7 - Formally Verified, Designed, and Tested

140
Q

PCI-DSS

A

Payment Card Industry - Data Security Standard, requirements for improving security of electronic payment transactions

141
Q

ISO

A

International Organization of Standardization

142
Q

Certification

A

comprehensive evaluation of the technical and nontechnical security features of an IT system

143
Q

Accredidation

A

management reviews the certification information and decides if it meets the security needs of the org

144
Q

Virtualization

A

used to host one or more OSs within the memory of a single host computer

145
Q

TPM

A

Trusted Platform Module - store and process cryptographic keys for the process of hard drive encryption

146
Q

Fault Tolerance

A

ability of a system to suffer a fault but continue to operate

147
Q

Fault Tolerance is generally achieved through the use of _________

A

RAID

148
Q

Hardware

A

tangible part of the system

149
Q

Multitasking

A

handle two or more tasks at once (not truly multitasking)

150
Q

Multiprocessing

A

harnessing the power of more than one processor

151
Q

Multiprogramming

A

pseudosimultaneous execution of two tasks on a single processor, , special software, usually large scale systems

152
Q

Multithreading

A

multiple tasks performed in a single process (i.e. opening multiple word docs)

153
Q

Single State Systems

A

use policy mechanisms to manage different levels of info, handle one level at a time

154
Q

Multistate Systems

A

handle multiple security levels simultaneously

155
Q

Protection Rings

A

Ring 0- highest level of privilege, kernel/Memory
Ring 1 - Other OS Components
Ring 2 - Drivers, protocols
Ring 3 - User Level programs and apps

156
Q

Dedicated Security Mode

A

Valid Clearance, Access Approval, & Need to Know for all info

157
Q

Security Modes Need 2 things _____

A

MAC environment & physical control

158
Q

System High Security Mode

A

Valid Clearance & Access Approval for all info, Need to Know for some info

159
Q

Compartmented Security Mode

A

Valid Clearance and Need to Know for all info, access approval for any info

160
Q

Multilevel Security Mode

A

Not all users have clearance, access approval and need to know for all info

161
Q

ROM

A

Read Only Memory - has PROM, EPROM, Flash Memory

162
Q

RAM

A

Random Access Memory - readable and writable, volatile

163
Q

Registers

A

On board memory

164
Q

Secondary Memory

A

magnetic, optical or flash based media that contain data not immediately available to the CPU

165
Q

Memory Security Issues

A

data retention, controlling access, ability to get data off of chips

166
Q

Storage Media Security

A

Data remanence, sanitization issues, prone to theft

167
Q

Firmware

A

software that is stored in a ROM chip, BIOS and device firmware

168
Q

Applet

A

code objects sent from a server to a client to perform some action

169
Q

Java Applets

A

programs transmitted over the internet to perform operations on remote systems

170
Q

ActiveX Controls

A

proprietary Microsoft tech, no sandbox restrictions

171
Q

Aggregation

A

combine records from one or more tables to produce potentially useful info , combine low level info and can get higher level info

172
Q

Interference

A

use deductive capability to combine prices of nonsensitive data to get classified data

173
Q

Data Mining

A

comb through data warehouses and look for potentially correlated info

174
Q

Data Warehousing

A

large databases to store large amount of info

175
Q

Data Analytics

A

science of raw data examination with the focus of extracting useful info out of bulk info

176
Q

Cloud Computing

A

processing and storage are performed elsewhere over a network connection

177
Q

Platform as a Service

A

operating system as a cloud based service

178
Q

Software as a Service

A

Google Docs, Office 365

179
Q

Infrastructure as a Service

A

platform + computing services

180
Q

Grid Computing

A

groups of processors that work together to reach a specific goal

181
Q

P2P

A

networked app solutions that share tasks and workload

182
Q

ICS

A

Industrial Control System

183
Q

DCS

A

Distributed Control Systems - large scale environment from a single location

184
Q

PLC

A

Programmable Logic Controllers - single purpose digital computers

185
Q

SCADA

A

Supervisory Control and Data Acquisition - stand alone device or networked

186
Q

Application Control

A

device mgmt solution on mobile device that limits installation of apps

187
Q

Storage Segmentation

A

isolate the OS and preinstalled apps from user apps and data

188
Q

Asset Tracking

A

maintain oversight over an inventory

189
Q

MDM

A

Mobile Device Management - push or remove apps, manage data, config settings

190
Q

Ways to Secure Mobile Devices

A

MDM, Storage Segmentation, Asset Tracking, Disabling Unused Features, Remote Wiping, FDE, etc.

191
Q

Application Whitelisting

A

Implicit Deny

192
Q

BYOD Concerns

A

data ownership, support ownership, patch mgmt, AV mgmt, forensics, privacy, on-boarding/off-boarding, adherence to corporate policy, user acceptance, Infrastructure considerations, legal concerns, Acceptable Use Policy, Camera/Video

193
Q

Embedded Systems

A

a computer implemented as part of a larger system ex: smart TVs, HVAC controls, smart appliances, etc.

194
Q

Cyber-physical

A

any computational device that can cause a movement to occur

195
Q

Methods of Securing Embedded Devices

A

Network Segmentation, Security Layers, App Firewalls, Manual Updates, Firmware Version Control, Wrappers, Control Redundancy and Diversity

196
Q

Network Segmentation

A

controlling traffic among networked devices to isolate the static environment - VLANS, MAC Address, IP Addresses, TCP/UDP ports

197
Q

Layering

A

Protection Mechanism Used to separate functions based on security, only allow communications through specific interfaces

198
Q

Abstraction

A

object-oriented programming, “black-box” doctrine, don’t need to know the details of how the object works just how to use it

199
Q

Data Hiding

A

data existing at one level of security is not visible to processes running at different security levels

200
Q

Process Isolation

A

requires the operating system provide separate memory spaces for each process, prevents reading and writing to other processes

201
Q

Hardware Segmentation

A

similar to process isolation but enforces through physical access controls

202
Q

Principle of Least Privilege

A

run in user mode whenever possible

203
Q

Separation of Privilege

A

least privilege for admins

204
Q

Covert Channel

A

method used to pass info over a path not normally used for communication, best way to detect is to analyze audit logs

205
Q

Covert Timing Channel

A

alters system component performance or modifies a resources timing

206
Q

Covert Storage Channel

A

writes data to a common storage area where another process can read it

207
Q

Maintenance Hooks

A

entry points into a system known only by developer (back doors)

208
Q

Data diddling attack

A

attacker makes small, random, or incremental changes to data

209
Q

Salami Attack

A

stealing small amounts of money from accounts

210
Q

Time of Check

A

time at which the subject checks the status of the object

211
Q

Time of Use

A

time at which the procedure accesses the object

212
Q

TOCTTOU

A

Time of check to time of use- attacker replaces original object with another inbetween TOC and TOU

213
Q

Faraday Cage

A

enclosure that acts as an EM capacitor

214
Q

Critical Path Analysis

A

define necessary supporting elements for operations

215
Q

Technology Convergence

A

systems merge over time and perform similar or redundant

216
Q

A proper level of security must be planned and designed before __________

A

construction begins

217
Q

Administrative Physical Security Controls

A

facility construction, site management, awareness training, emergency response…

218
Q

Technical Physical Security Controls

A

access controls, CCTV, IDS, HVAC, etc.

219
Q

Physical Physical Security Controls

A

fencing, lighting, locks, dogs, guards, etc.

220
Q

Functional order of physical security control types

A
  1. Deterrent
  2. Denial
  3. Detection
  4. Delay
221
Q

MTTF

A

Mean time to failure - expected typical functional lifetime of the device

222
Q

MTTR

A

Mean Time to Repair - time to repair device

223
Q

MTBF

A

Mean time between failures - time between first and any subsequent failures

224
Q

Premises Wire Distribution Room

A

Wiring closet

225
Q

Server rooms should be located at the _____ of the building

A

Core

226
Q

Heartbeat Sensor

A

communication pathway is constantly or periodically checked

227
Q

TEMPEST Measures (3)

A

Faraday Cage, White Noise, Control Zone

228
Q

Control Zone

A

implementation of either a Faraday Cage or white noise generation or both to protect a specific area in a environment

229
Q

UPS

A

Uninterruptible Power Supply - self charging battery

230
Q

Fault

A

Momentary loss of power

231
Q

Blackout

A

complete loss of power

232
Q

Sag

A

Momentary Low voltage

233
Q

Brownout

A

Prolonged low voltage

234
Q

Spike

A

Momentary high voltage

235
Q

Surge

A

prolonged high votlage

236
Q

Inrush

A

initial surge of power usually associated with connecting to a power source

237
Q

Noise

A

steady interfering power disturbance or fluctuation

238
Q

Transient

A

short duration of line noise disturbance

239
Q

Clean

A

nonfluctuating power

240
Q

ANSI Power Standards for Brownout

A

allow for 8% drop in power btwn source and facility meter and 3.5% drop between the facility meter and wall outlet

241
Q

Temp and Humidity for rooms

A

60-70 degrees F, 40-60% humidity

242
Q

Abrupt system shutdown happens at ______ static volts

A

2000

243
Q

Destruction of data stored on hard drives happens at ____ static volts

A

1500

244
Q

Scrambling of monitor displays happens at ______ static volts

A

1000

245
Q

Destruction of sensitive circuits happens at ______ static volts

A

40

246
Q

Fire Extinguisher Classes

A

A: Common combustibles; Water, Soda Acid
B: Liquids; CO2, Halon, Soda Acid
C: Electrical; CO2, Halon
D: Metal: Dry Powder

247
Q

Wet Pipe System

A

always full of water, immediate discharge

248
Q

Dry Pipe System

A

contains compressed air, discharges water

249
Q

Deluge System

A

dry pipe, larger amount of water

250
Q

Preaction System

A

combination dry and wet pipe - most approriate to use

251
Q

What kind of cryptography does SSL/TLS use?

A

Hybrid but Asymmetric over Symmetric

252
Q

What kind of cyrptography does SSL/TLS use for data exchange?

A

Symmetric

253
Q

What kind of cyrptography does SSL/TLS use for key exchange?

A

Asymmetric

254
Q

What is the formula for symmetric cryptography?

A

[N*(N-1)]/2

255
Q

What is the formula for asymmetric cryptography?

A

2N

256
Q

Name the 6 testable asymmetric algorithms

A

RSA, DSA, ECC, El Gamal, Diffue Hellmen, Knapsack