Domain 3: System Design Flashcards

1
Q
  • Uses multiple security controls in a series

- i.e. pass one security control you enter into another

A

Layering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Generic list of security architecture layers

A
  1. Hardware
  2. Kernel and device drivers
  3. OS
  4. Applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hides unnecessary details from the user.

A

Abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List of objects a subject is allowed to access.

A

Security Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • CPU hardware layering model that separates and protects domains from each other
  • i.e. kernel mode and user mode
A

Ring Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Allow processes to communicate with the kernel and provide a window between the rings

A

System Calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the rings in the Ring Model

A

Ring 0: Kernel
Ring 1: Other OS components that do not fit in Ring 0
Ring 2: Device drivers
Ring 3: User applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uses open hardware and standards, using standard components from a variety of vendors

A

Open System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Uses proprietary hardware or software

A

Closed System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Another name for a computer case

A

System Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Communication between the CPU, memory, and input/output devices (i.e. keyboard, mouse, and etc.) occurs here

A

Computer Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is the part of the CPU that performs math calculations

A

Arithmetic Logic Unit (ALU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Four steps of a CPU “fetch and execute (FDX)” process

A
  1. Fetch instructions
  2. Decode instruction
  3. Execute instruction
  4. Write (save) Result
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Combines multiple CPU steps into one process

A

Pipelining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Causes the CPU to stop processing its current task, save the state and begin processing a new request.

A

Interrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An executable program and its associated data loaded and running in memory

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Parent process that spawns additional child processes

A

Threads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Allows multiple tasks to run simultaneously on one CPU

A

Multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Runs multiple processes on multiple CPUs

A

Multiprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CPU design that uses a large set of complex machine language instructions

A

Complex Instruction Set Computer (CISC)

21
Q

CPU design that uses reduced set of simpler instructions

A

Reduced Interaction Set Computer (RISC)

22
Q

Memory logical control that prevents one process from interfacing with another

A

Process Isolation

23
Q

Uses virtual memory to copy contents of RAM to and from disk

A

Swapping

24
Q

Storage that can be written to once and read many times.

A

WORM Storage

25
Q

Hardware chip that provides random number generation for cryptographic operations

A

Trusted Platform Module

26
Q

Prevents code execution in memory locations that are not pre-defined to contain executable content

A

Data Execution Prevention (DEP)

27
Q

Randomizes memory addresses make exploitation difficult

A

Address Space Location Randomization (ASLR)

28
Q

Provides interface between hardware and rest of the OS

A

Kernel

29
Q
  • Enforces system’s security policy
  • Logical part of the TCB
  • i.e. preventing a normal user from writing to a restricted file like the system password file
A

Reference Monitor

30
Q

Called bare metal, virtualization OS runs directly on server

A

Type 1 Hypervisor

31
Q

Virtualization application runs on a normal OS i.e. Windows 10

A

Type 2 Hypervisor

32
Q
  • Customer configures OS, apps, and performs all required maintenance
  • Cloud service provider maintains the cloud infrastructure
  • i.e. servers, storage, some cases network resources
A

Infrastructure As A Service (IaaS)

33
Q
  • Customer manages their apps
  • Cloud service provider is responsible for the maintenance of host OS and the underlying infrastructure
  • i.e. hardware, OS, applications
A

Platform As A Service (PaaS)

34
Q
  • Completely configured, from the OS to apps
  • Customer does not manage or control any assets
  • i.e. Gmail
A

Software as a Service (SaaS)

35
Q
  • Cloud that houses data for a single organization

- Can be operated by a third party or in-house

A

Private Clouds

36
Q

Attempts to harness the computational resources of a large number of dissimilar devices

A

Grid Computing

37
Q

Allows for increased performance through economies of scale

A

Large-Scale Parallel Systems

38
Q
  • Any system can act as client, server or both, depending on data needs
  • No central servers in this model.
A

Peer-to-Per (P2P)

39
Q

Allows centralization of applications and their data, as well as the associated security costs of upgrades, patching, data storage, etc.

A

Thin Clients

40
Q

Form of computer management device that controls industrial processes and machines

A

Industrial Control Systems (ICS)

41
Q

Typically found in industrial process plants where the need to gather data and implement control over a large-scale environment from a single location is essential.

A

DCS Units

42
Q
  • Typically deployed for management and automation of various industrial operations
  • i.e. Controlling systems on a assembly line, large digital light display (giant display system in a stadium)
A

PLC Units

43
Q

Can operate as a stand alone device, be networked together with other like systems, or be networked with traditional IT systems.

A

SCADA System

44
Q

Divides CPU time among child process (aka threads)

A

Multithreading

45
Q

Restricts a process to reading from and writing to certain memory locations

A

Confinement

46
Q

Limits of memory a process cannot exceed when reading or writing

A

Bounds

47
Q

The mode a process runs in when it is confined through the use of memory bounds

A

Isolation

48
Q

Collections of TCB components that implement the functionality of the reference monitor

A

Security Kernel