Secure System Design Concepts Flashcards

1
Q

Kernel mode (Supervisor mode)

A

is where the kernel lives, allowing low-level unrestricted access to memory, CPU, disk, etc. This is the most trusted and powerful part of the system. Crashes are not recoverable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

User mode (Problem mode)

A

has no direct access to hardware, it is directed through an API (Application programming interface). Crashes are recoverable. This is most of what happens on a PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Ring Model:

A

4 ring model that separates Users (Untrusted)
from the Kernel (Trusted).
 The full model is slow and rarely used; most
OS’s only use rings 0 and 3.
 There is a new addition to the Ring Model:
Hypervisor mode is called Ring -1 and is for VM
Hosts. Ring -1 sits below the Client kernel in Ring 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

System unit

A

– The case and all internal hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Motherboard

A
  • Motherboard and CPU, memory slots, firmware, PCI slots
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Peripherals

A

Mouse, keyboard, monitors, anything plugged into the system unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Regular computer bus

A

– The primary communications channel on a computer.

 Communicates between internal hardware and I/O devices (Input/Output), keyboards, mice, monitors, webcams, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Northbridge and Southbridge

A

This design is more common on newer computers
and replaces the regular computer bus.
 The Northbridge (Host bridge) is much faster than the Southbridge.
 There are no North/Southbridge standards, but they must be able to work with each other.
 There is a move towards integrating the Northbridge onto the CPU itself (Intel Sandy Bridge / AMD Fusion).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CPU (Central Processing Unit)

A

is the brains of the system.
 It performs millions of calculations; everything a computer does is math.
 CPUs are rated on their clock cycles per minute. Example: a 4.2GHz processor has 4.2 billion clock cycles per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Arithmetic logic unit (ALU)

A

performs arithmetic and logic operations.
It’s a processor that registers the supply operands
(Object of a mathematical operation) to the ALU and
stores the results of ALU operations.
It does all the math.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Control unit (CU)

A
handles fetching (from memory) and
execution of instructions by directing the coordinated operations of
the ALU, registers and other components. It also sends instructions to the ALU.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multithreading, Processing, Tasking and Programming.

A

Multithreading is the ability of a central processing unit (CPU) or a single core in a multi-core processor to execute multiple processes or threads concurrently, appropriately supported by the operating system.
 Multiprocessing - A computer using more than one CPU at a time for a task.
 Multitasking - Tasks sharing a common resource (1 CPU).
 Multiprogramming - A computer running more than one program at a time (Word and Chrome at the same time).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Memory protection

A

prevents one process from affecting the confidentiality, integrity, or availability of another. Used to protect user/process data in multi-user and multitasking environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Process isolation

A

is a logical control that tries to prevent one process from Interfering with another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hardware segmentation

A

takes that a step further by mapping processes to specific memory locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virtual Memory

A

provides virtual address mapping between applications and hardware memory. Virtual memory is used for many things: multitasking, multiprocessing, swapping, to name a few

17
Q

Swapping

A

moves entire processes from primary memory (RAM) from/to secondary memory (Disk).

18
Q

Paging

A

copies a block from primary memory (RAM) from/to secondary memory
(Disk).

19
Q

BIOS

A

Basic Input Output System (Low level

OS)

20
Q

WORM Media (Write Once Read Many):

A

ROM is a WORM Media (not in use, though).

 CD/DVDs can be WORM Media (R), if they are not R/W (Read/Write).

21
Q

TPM (Trusted Platform Module):

A

Is an international standard for a secure cryptoprocessor, which is a dedicated microcontroller designed to secure hardware by integrating cryptographic keys into devices.
 TPM can be used for RNG (Random Number Generation), Symmetric Encryption, Asymmetric Encryption, Hashing Algorithms, and secure storage of cryptographic keys and message digests.
 It is most commonly used to ensure boot integrity.

22
Q

Data Execution Prevention (DEP)

A

is a security feature that can prevent damage to your computer from viruses and other security threats.
 Harmful programs can try to attack Windows by attempting to execute code from system memory locations reserved for Windows and other authorized
programs; DEP prevents that

23
Q

Address Space Layout Randomization (ASLR)

A

is a memory-protection process for OS’s; it guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory.

24
Q

The Kernel

A

At the core of the OS is the Kernel. At ring 0 (or 3), it interfaces between the operating system (and applications) and the hardware.
A monolithic kernel is one static executable and the kernel runs in supervisor mode. All functionality
required by a monolithic kernel must be precompiled in.
 Microkernels are modular kernels. A microkernel is smaller and has less native functionality than a monolithic kernel. They can add functionality via
loadable kernel modules.
Microkernels may also run kernel modules in user mode ring 3, instead of supervisor mode. If a nonprecompiled piece of hardware is added the Microkernel can load it, making the hardware work.
 The reference monitor is a core function of the kernel; it handles all access between subjects and objects. It is always on and can’t be bypassed.

25
Q

IaaS - (Infrastructure as a Service)

A

The vendor provides infrastructure up to the OS, the customer adds the OS and up.

26
Q

SaaS - (Software as a Service)

A

The vendor provides the OS and applications/programs. Either the customer interacts with the software manually by entering data on the SaaS page, or data is automatically pushed from your other applications to the SaaS application (Gmail, Office 365, Dropbox, Payroll).

27
Q

PaaS - (Platform as a Service)

A

The vendor provides pre-configured OSs, then the customer adds all programs and applications.