Domain 3-Security Engineering (Engineering and Management of Security) Flashcards

1
Q

Bell-LaPadula

A

No Read Up, confidentiality , Simple Security Property and the * Security Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Simple Security Property

A

no read up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Property

A

a subject at a higher classification level cannot write to a lower classification level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Strong Tranquility Property

A

states that security labels will not change while the system is operating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Weak Tranquility

A

Property states that security labels will not change in a way that conflicts with defined security properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lattice-based access

A

allows security controls for complex environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Simple Integrity Axiom

A

no read down:” a subject at a specific classification level cannot read data at a lower classification. This prevents subjects from accessing information at a lower integrity level. This protects integrity by preventing bad information from moving up from lower integrity levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity Axiom

A

“no write up:” a subject at a specific classification level cannot write to data at a higher classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Clark-Wilson

A

is a real-world integrity model that protects integrity by requiring subjects to access objects via programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Clark-Wilson enforces the concept

A

separation of duties and transformation procedures within the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Chinese Wall model/ Brewer-Nash

A

by prohibiting one person, such as a consultant, from accessing multiple conflict of interest categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The noninterference model ensures

A

that data at different security domains remain separate from one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The noninterference model

A

ensures that data at different security domains remain separate from one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Take-Grant Protection Model

A

contains rules that govern the interactions between subjects and objects, and permissions subjects can grant to other subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Harrison-Ruzzo-Ullman Model

A

In addition to HRU’s different operations, it also differs from Graham-Denning because it considers subjects to be also objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Abstraction

A

hides unnecessary details from the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A security domain

A

is the list of objects a subject is allowed to access. More broadly defined, domains are groups of subjects and objects with similar security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The Ring Model

A

The ring model is a form of CPU hardware layering that separates and protects domains (such as kernel mode and user mode) from each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The northbridge

A

is directly connected to the CPU, and is faster than the southbridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SMP systems

A

SMP systems have one operating system to manage all CPUs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AMP systems

A

have one operating system image per CPU, essentially acting as independent systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A monolithic kernel

A

is compiled into one static executable and the entire kernel runs in supervisor mode.

23
Q

Microkernels

A

A microkernel is usually smaller and has less native functionality than a typical monolithic kernel (hence the term “micro”), but can add functionality via loadable kernel modules

24
Q

transparent virtualization

A

uns stock operating systems, such as Windows 10 or Ubuntu Linux 15.04, as virtual guests. No changes to the guest OS are required.

25
Q

Paravirtualization

A

uns specially modified operating systems, with modified kernel system calls. Paravirtualization can be more efficient, but requires changing the guest operating systems. This may not be possible for closed operating systems such as the Microsoft Windows family.

26
Q

Covert Storage Channels

A

A storage channel example uses shared storage, such as a temporary directory, to allow two subjects to signal each other.

27
Q

A covert timing channel

A

relies on the system clock to infer sensitive information

28
Q

Maintenance hooks

A

are a type of backdoor; they are shortcuts installed by system designers and programmers to allow developers to bypass normal system checks during development, such as requiring users to authenticate

29
Q

Polymorphic virus

A

a virus that changes its signature upon infection of a new system, attempting to evade signature-based antivirus software

30
Q

Multipartite virus

A

a virus that spreads via multiple vectors. Also called multipart virus.

31
Q

A rootkit

A

is malware that replaces portions of the kernel and/or operating system

32
Q

SOAP (originally an acronym for ‘Simple Object Access Protocol,’ but now simply ‘SOAP’)

A

provides the connectivity

33
Q

Electronic Code Book (ECB)

A

is the simplest and weakest form of DES. It uses no initialization vector or chaining. Identical plaintexts with identical keys encrypt to identical ciphertexts. Two plaintexts with partial identical portions (such as the header of a letter) encrypted with the same key will have partial identical ciphertext portions.

34
Q

Cipher Block Chaining (CBC) mode

A

is a block mode of DES that XORs the previous encrypted block of ciphertext to the next block of plaintext to be encrypted.

35
Q

One limitation of CBC mode is

A

that encryption errors will propagate: an encryption error in one block will cascade through subsequent blocks due to the chaining, destroying their integrity

36
Q

he primary difference is CFB is a …….

A

stream mode.

37
Q

Output Feedback (OFB)

A

Since the subkey is not affected by encryption errors, errors will not propagate.

38
Q

Counter (CTR)

A

encryption can be done in parallel

39
Q

Triple DES

A

the primary weakness is that it is slow and complex compared to newer symmetric algorithms

40
Q

“double DES”

A

s not used due to a meet-in-the-middle attack: see the “Cryptographic Attacks” section for more information.

41
Q

International Data Encryption Algorithm (IDEA)

A

the primary drawbacks are patent encumbrance and its slow speed compared to newer symmetric ciphers such as AES

42
Q

AES uses

A

128-bit (with 10 rounds of encryption), 192-bit (12 rounds of encryption), or 256-bit (14 rounds of encryption) keys to encrypt 128-bit blocks of data

43
Q

A known plaintext attack

A

relies on recovering and analyzing a matching plaintext and ciphertext pair: the goal is to derive the key that was used.

44
Q

Encrypting without knowing the key is done …

A

via an “encryption oracle,

45
Q

Linear cryptanalysis

A

is a known plaintext attack where the cryptanalyst finds large amounts of plaintext/ciphertext pairs created with the same key

46
Q

Side-channel attacks

A

use physical data to break a cryptosystem, such as monitoring CPU cycles or power consumption used while encrypting or decrypting.

47
Q

An implementation attack

A

xploits a mistake (vulnerability) made while implementing an application, service or system.

48
Q

The birthday attack is used

A

o create hash collisions.

49
Q

Key Clustering

A

s when two symmetric keys applied to the same plaintext produce the same ciphertext. This allows two different keys to decrypt the ciphertext.

50
Q

A Hashed Message Authentication Code (HMAC)

A

combines a shared key with hashing. IPsec uses HMACs

51
Q

IPsec (Internet Protocol Security) is a suite of protocols that provide a cryptographic layer to both

A

to both IPv4 and IPv6.

52
Q

IPsec includes two primary protocols:

A

Authentication Header (AH) and Encapsulating Security Payload (ESP). AH and ESP provide different, and sometimes overlapping functionality.

53
Q

Authentication Header provides

A

authentication and integrity for each packet of network data. AH provides no confidentiality; it acts as a digital signature for the data. AH also protects against replay attacks, where data is sniffed off a network and resent, often in an attempt to fraudulently reuse encrypted authentication credentials.

54
Q

Encapsulating Security Payload

A

primarily provides confidentiality by encrypting packet data. It may also optionally provide authentication and integrity.