Feature-based Risk Flashcards

1
Q

How can adding features to software introduce risk?

A

It can open up a new attack surface, potentially leading to compromise or breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a primary risk associated with location-based services?

A

Collection of data on user location and habits, raising privacy concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some uses for location-based services?

A

Finding local stores/attractions, tracking fleets/employees/deliveries, targeted promotions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does RFID stand for?

A

Radio Frequency Identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are RFID tags often used for?

A

Tracking assets (laptops, phones), inventory, physical access (who was where).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a potential fraud risk with RFID in retail?

A

Swapping tags between items to pay a lower price.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does NFC stand for?

A

Near Field Communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List common applications of NFC.

A

Contactless payments (tap-to-pay), door entry systems, exchanging files between nearby devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What security risks are associated with NFC?

A

Potential for stealing personal data or creating fraudulent transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are embedded systems?

A

Computing processes built into other products (like cars, thermostats), usually performing a specific function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What makes patching embedded systems often difficult?

A

They may not be easily accessible physically or technologically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is the long lifespan of embedded systems a security concern?

A

They may remain in use long after vulnerabilities are discovered, potentially without security designed in initially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What challenge exists in isolating functions within embedded systems like cars?

A

It can be difficult to securely separate critical systems (driving controls) from non-critical ones (radio, Bluetooth) connected via network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What environmental conditions must some embedded systems tolerate?

A

Humidity, high/low temperatures, and other difficult environmental factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is firmware?

A

Low-level software embedded onto read-only memory (ROM) or flash memory on hardware chips.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a supply chain risk related to firmware?

A

Chips could be infected with malicious code or backdoors during the manufacturing process.

17
Q

What technology allows the logic on some chips to be altered after manufacturing?

A

Field-Programmable Gate Arrays (FPGAs).

18
Q

What are PLDs or PLCs?

A

Programmable Logic Devices / Programmable Logic Controllers.

19
Q

What is a concern for programmable logic devices regarding power loss?

A

Ensuring they don’t lose their configuration if power fails.

20
Q

What is a TPM?

A

Trusted Platform Module; a chip often added to a motherboard for security functions.

21
Q

What is a primary function of a TPM?

A

Secure storage of cryptographic keys.

22
Q

What process can utilize a TPM to enhance security during startup?

A

A secure boot process, requiring authentication before the main operating system loads.

23
Q

What fundamental problem led to vulnerabilities like Spectre and Meltdown?

A

Lack of proper isolation between different processes running on the same processor chip.

24
Q

How can vulnerabilities like Spectre/Meltdown bypass software controls?

A

They operate at the hardware level, potentially allowing access to memory regions or permissions intended for other processes.

25
Q

What is required to mitigate hardware vulnerabilities like Spectre?

A

Firmware and software updates to re-establish or improve process isolation and fix configuration issues.

26
Q

What is the purpose of the Common Criteria?

A

To provide internationally recognized standards (ISO 15408) for evaluating and testing the security of IT products.

27
Q

In Common Criteria terms, what is the “Target of Evaluation” (TOE)?

A

The specific product or system that is being tested.

28
Q

What does a “Protection Profile” (PP) define in Common Criteria?

A

A description of the type of security or protection a category of product provides.

29
Q

What does the “Security Target” (ST) specify?

A

The specific security goals or aims of the particular product being evaluated.

30
Q

What does “Evaluation Assurance Level” (EAL) represent?

A

The level of rigor and depth of the testing performed, indicating the level of trust in the evaluation results.

31
Q

What components beyond application software need vulnerability assessment and mitigation?

A

Operating systems, firmware, database management systems, embedded systems, and other supporting infrastructure.