Implementing Secure Systems Flashcards

1
Q

What is Least Functionality?

A

least functionality is a core security principle stating that systems should only have the least amount applications, services and protocols necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In implementing secure Operating Systems, the requirements of a trusted operating system have to meet what goal and who/what defines these requirements?

A

it meets a set of predetermined requirements (regarding security) so that only authorized personal can access data based on their permissions.
The requirements are defined in the Common Criteria (for Information Technology Security Evaluation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A trusted operating system prevents what? What access control model does it use?

A

modifications by unauthorized users and prevents malicious code from executing.
It commonly uses the Mandatory Access Control model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

requirements for certified trusted operating systems are defined by third parties, true or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are two important benefits that Imaging provides?

A

SECURITY - A secure starting point for an OS build

COST SAVING - because a) it’s easy to deploy, b) easier to support as there’s only a single OS version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do Windows system admins use to automatically check and configure systems?

A

Group Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the 3 steps of secure baselining

A

1) Create an initial, secure baseline configuration of a OS and deploy it across devices
2) The baseline config is monitored for deviation, called Integrity Measurements
3) Deviations detected can then be isolated for remediation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is common security issue with unauthorized software?

A

it often contains Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Linux sandbox feature that allows isolation of an application? How is it isolated?

A

it’s called Chroot. It changes the root directory of the application, preventing it from accessing system files in the root directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A secure staging environment actually includes multiple environments, what are they?

A

Development
Test
Staging
Production!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What two electrical phenomena does secure systems design address?

A

EMI and EMP (Electro magnetic Pulse)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Regarding encryption. Describe an FDE and SED

A

FDE = full disk encryption.
An SED is a Self-Encrypting Drive which is a drive that features the hardware and software to encrypt the drive and securely store the encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A TPM is a hardware ____ included on many laptops and mobile devices. It provides ___ ____ encryption and supports a secure ____ ___ and remote _____. A TPM includes a unique ____ ____ key burned onto the chip which provides a hardware root of trust.

A

A TPM (Trusted Platform Module) is a hardware CHIP included on many laptops and mobile devices. It provides FULL DISK ENCRYPTION and supports a secure BOOT PROCESS and remote ATTESTATION. A TPM includes a unique RSA ASYMMETRIC key burned onto the chip which provides a hardware root of trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IN TPM, what does the secure boot process check for?

A

it checks key boot files against the signatures of those same files it stored in the TPM on initially setting up. If the signatures don’t match, it indicates the boot files have been changed and blocks the boot process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a HSM and what is it typically used by?

A
a HSM (Hardware Security Module). It's a removable or external device that can generate, store and manage RSA keys used in asymettric encryption
It is typically used by servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which cloud solution does the customer have most responsibility over maintenance and security responsibilities? Why?

A

IaaS
Because it is the customer who is charges with installing and configuring the software on the infrastructure provided to them by the CSP

17
Q

What does SecurityaaS do and what effect might that have on staff/training?

A

It outsources the administrative task of implementing a security application like keeping antivirus up to date
COST SAVING - It also eliminates the need for employees to be experts on everything

18
Q

What cloud device can enforce security policy when accessing cloud services like ensuring that all network traffic is encrypted?

A

A cloud access security broker (CASB)

19
Q

From a security perspective, sandboxing is useful for testing…

A

…security controls and testing patches

20
Q

describe the staging environment

A

it simulates the production environment and is used for late stage testing

21
Q

which environment involves the initial creation of the application and includes version and change management controls to track the app development?

A

Development environment

22
Q

What secure operating system concept is defined in the Common Criteria?

A

Trusted Operating systems