Domain 3.3: Security Architecture and Engineering Flashcards
Learn essential terms related to secure system design, hardware, and cryptographic principles.
Define:
Salt
Random data added to a password before hashing, enhancing security against cracking.
A random string of characters added to a password before it is hashed. It is used in cryptography to make it more difficult for attackers to crack hashed passwords. Examples of salt include adding a string of random numbers to a password before it is hashed or using a unique salt for each password in a database.
For more information, view this lecture on Hashing- Part 2. Or visit this Wikipedia page.
Define:
Sandbox
A controlled environment for safely running untrusted programs or code without risking the integrity of the host system.
A controlled environment used for testing or running potentially dangerous or suspicious code. It is used in cybersecurity to prevent malicious software from damaging systems or networks. Examples include a web browser’s sandbox for running untrusted code, a malware analysis sandbox for studying malware behavior, and a network sandbox for testing new security protocols.
For more information, view this lecture on Web architecture and attacks. Or visit this Wikipedia page.
Define:
SCADA
(Supervisory Control And Data Acquisition)
Systems used for monitoring and controlling industrial processes and critical infrastructure.
A system used to monitor and control industrial processes and infrastructure, such as power plants, water treatment facilities, and transportation networks. It is used to automate and remotely manage complex systems and processes. Examples include a SCADA system for monitoring and controlling a power grid, a SCADA system for managing a water treatment plant, and a SCADA system for coordinating traffic signals in a city.
For more information, view this lecture on Industrial Control Systems. Or visit this Wikipedia page.
Define:
Scalability in Cloud Computing
The ability to easily expand or decrease IT resources as needed to accommodate changing demands without impacting performance.
The ability to handle an increased workload without a decrease in performance. This concept is used in cloud computing to ensure that a system can handle the added demand of new users or applications without slowing down. For example, a company might need to add new users to its cloud-based email system without disrupting service for existing users.
For more information, view this lecture on Secure Access Service Edge. Or visit this Wikipedia page.
Define:
Secure Boot
Secure Boot ensures a device starts with trusted software by verifying cryptographic signatures during the boot process, preventing unauthorized or tampered firmware from loading.
Commonly used in modern PCs, mobile devices, and embedded systems, Secure Boot relies on hierarchical key management. The firmware checks the bootloader, which then checks the operating system kernel. If any component is invalid, the boot process halts. This chain of trust protects against rootkits and other low-level malware. Administrators can further customize key settings to allow or block specific OS versions or custom software.
For more information, visit this Wikipedia page.
Define:
Secure Cryptoprocessors
Dedicated hardware components designed to handle sensitive cryptographic operations and protect against physical attacks.
Hardware components designed to securely handle sensitive data such as cryptographic keys and personal identification numbers (PINs). They are embedded in tamper-resistant packaging to prevent physical attacks and are integral to the security of systems processing transactions, authentication credentials, and other critical data.
For more information, view this lecture on Hardware architecture- Part 2. Or visit this Wikipedia page.
Define:
Secure Defaults
(or Secure-By-Default)
The practice of pre-configuring systems or applications with the most secure settings to minimize risk.
The practice of setting security settings to the most secure option as the default so that users do not have to manually adjust them. This is used in software and system design, as well as in network and device configuration. For example, a password manager may have a secure default password length requirement, or a router may have a secure default firewall configuration.
For more information, view this lecture on Secure design principles. Or visit this Wikipedia page.
Define:
Secure Enclave
A secure enclave is a hardware-based environment—often within CPUs—that isolates sensitive data and operations from the main operating system, protecting them from unauthorized access.
Examples include Apple’s Secure Enclave for biometric data or Intel SGX for confidential computing. These enclaves encrypt stored information and restrict code execution to verified components. Even if the larger OS is compromised, enclave data remains shielded. This design underpins secure key storage, digital rights management, and cryptographic computations, bolstering user privacy and system integrity.
For more information, visit this Wikipedia page.
Define:
Secure Enclave
A hardware-isolated area for processing sensitive data securely.
A secure enclave is a dedicated, isolated region within a processor that handles sensitive computations and data in a protected environment. It prevents unauthorized access and mitigates risks from software vulnerabilities by keeping critical operations separate from the main system. Secure enclaves are increasingly used in modern devices to safeguard cryptographic keys, personal data, and other confidential operations against sophisticated attacks.
For more information, visit this Wikipedia page.
Define:
Secure Hash Algorithm
(SHA)
A family of cryptographic hash functions used for data integrity, including SHA-1, SHA-2, and SHA-3.
A group of cryptographic hash functions designed to ensure data integrity. By producing a fixed-size hash value from variable input data, SHA helps verify unchanged data transfer, confirm file authenticity, and securely store passwords.
For more information, view this lecture on Hashing- Part 2. Or visit this Wikipedia page.
Define:
Secure Hash Algorithm-3
A cryptographic hash function announced as the winner of the NIST hash function competition, offering improved performance.
A cryptographic hash function that was announced as the winner of the NIST hash function competition in 2012. Despite being part of the same family, SHA-3 is fundamentally different from SHA-1 and SHA-2, offering better performance and resistance against potential vulnerabilities. SHA-3 can be used for creating hash values to ensure data integrity, generating unique identifiers for data, and creating digital signatures, among other uses.
For more information, view this lecture on Hashing- Part 2. Or visit this Wikipedia page.
Define:
Secure Hash Standard
Cryptographic hash functions standardized by NIST, including SHA-1, SHA-2, and SHA-3, for data integrity verification.
A set of cryptographic hash functions that include SHA-1, SHA-2, and SHA-3, as approved and published by the National Institute of Standards and Technology (NIST) in the United States. These algorithms are widely used to verify data integrity and authenticity. The Secure Hash Standard plays a critical role in many security protocols and applications to provide assurances of data integrity.
For more information, view this lecture on Hashing- Part 2. Or visit this Wikipedia page.
Define:
Secure Hashing Algorithm
(SHA-1)
A hashing algorithm producing a 160-bit hash value, previously used for security applications but now considered vulnerable.
A cryptographic hash function that produces a 160-bit hash value, which is typically rendered as a 40-digit hexadecimal number. SHA-1 is part of the Secure Hash Algorithm family designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). It was widely used for security applications and protocols, including TLS and SSL, PGP, SSH, and IPsec. However, SHA-1 is no longer considered secure against well-funded attackers; as of 2005, theoretical weaknesses were discovered, and over time, practical attacks have demonstrated the ability to produce collisions (two different inputs that result in the same hash value). As a result, it has been recommended to transition to stronger hash functions such as SHA-256 or SHA-3.
For more information, view this lecture on Hashing- Part 2. Or visit this Wikipedia page.
Define:
Secure Multi-Party Computation
(SMPC)
SMPC lets multiple parties jointly compute a function over their inputs while keeping each input private, using cryptographic protocols that shield individual data.
This enables collaborative tasks—like analytics or machine learning on shared datasets—without revealing raw data or sensitive details. Techniques include secret sharing and homomorphic encryption, distributing computations across parties so no single entity sees the others’ full data. SMPC helps organizations comply with strict privacy regulations while benefiting from shared insights. It’s particularly relevant for healthcare, finance, and consortium-based analytics where confidentiality is crucial.
For more information, visit this Wikipedia page.
Define:
Secure State
A condition where an information system is adequately protected against unauthorized access and potential threats.
A state of security in which an information system is protected against unauthorized access, use, disclosure, disruption, modification, or destruction. It is used in security planning and risk management. Examples include the secure state of a computer system, the secure state of a network, and the secure state of a building.
Define:
Secure Subsystem
A system component designed to safeguard against unauthorized access and ensure the overall protection of the system.
A subsystem of an information system that is designed and implemented to protect the system against unauthorized access, use, disclosure, disruption, modification, or destruction. It is used in security architecture and design. Examples include firewalls, intrusion detection systems, and encryption algorithms.
Define:
Security as a Service
(SECaaS)
A cloud model delivering security services over the internet, simplifying security management for organizations.
A model of delivering security services over the internet. It is used in cloud computing, managed security services, and other internet-based security solutions. Examples include email encryption services, antivirus services, and identity and access management services.
For more information, visit this Wikipedia page.
Define:
Security by Design
Security by Design embeds protective measures and threat considerations early in development cycles, ensuring secure architectures rather than retrofitting defenses later.
Instead of adding security controls after products or systems are built, Security by Design involves proactive threat modeling, secure coding, and continuous risk assessment at every phase. This fosters robust applications resistant to common attack vectors. Emphasizing security from the outset lowers remediation costs, shortens patch cycles, and aligns closely with regulatory demands. Ultimately, it cultivates a culture of prevention over reaction, improving trust and lowering vulnerability exposure.
For more information, visit this Wikipedia page.
Define:
Security Design
The process of architecting systems, applications, and infrastructure with security as a core concern.
The process and practice of planning and creating systems, applications, and infrastructure with security as a central concern. Security design encompasses a range of activities, from the initial conceptualization of a system to detailed architecture and implementation. It involves identifying potential threats, defining security requirements, and selecting appropriate security controls to mitigate risks to an acceptable level. Good security design aims to achieve a balance between security measures and usability, ensuring robust defense against attacks while maintaining functionality and performance. It incorporates principles such as least privilege, defense in depth, and redundancy and is an essential aspect of developing secure IT systems and applications.
Define:
Security Guards
Security guards are trained personnel tasked with protecting premises, assets, and individuals by monitoring, patrolling, and responding to security incidents.
They often collaborate with electronic surveillance systems, coordinate visitor access, and enforce organizational policies. Physical presence deters potential intruders and provides a frontline response to threats like theft, vandalism, or unauthorized entry. Effective programs integrate guard operations with broader security frameworks, promoting rapid incident escalation and thorough documentation. Well-equipped, vigilant guards reinforce both employee safety and asset protection.
For more information, view this lecture on Physical security- Part 1. Or visit this Wikipedia page.
Define:
Security Kernel
The central part of a secure operating system that enforces security policy and protects critical functions.
The core component of a secure operating system that enforces the security policy for the entire system. It provides mechanisms such as authentication and access control and is designed to be tamper-proof and resilient to attacks, isolating critical security functions from the rest of the system.
For more information, view this lecture on Secure system design concepts. Or visit this Wikipedia page.
Define:
Security Models
Frameworks outlining structures and processes needed to enforce security policies within an organization’s IT environment.
Conceptual frameworks that outline the structures and processes needed to enforce security policies within an organization’s IT environment. Security models help guide the design and implementation of system security by establishing clear rules and protocols for data confidentiality, integrity, and availability.
For more information, view this lecture on Security models and concepts - Introduction Or visit this Wikipedia page.
Define:
Security Perimeter
The boundary that defines where an organization’s security controls are enforced, guarding against external threats.
A boundary that defines the physical or logical limits where an organization’s security controls are enforced. The security perimeter guards against external threats and often includes firewalls, IDS/IPS, and access control lists to prevent unauthorized access.
For more information, view this lecture on Physical security- Part 5..
Define:
Security Target
A document outlining the security requirements and objectives of a system and the controls implemented to meet them.
A document that outlines the security requirements and objectives of a system or product and specifies how the security controls are implemented and tested. Used in product development and certification. Examples -Security target for a cloud computing service, security target for a mobile app, security target for a network security device.
For more information, view this lecture on Security Evaluation Models. Or visit this Wikipedia page.