Security Architecture Flashcards

1
Q

The rings are (theoretically) used as follows:

A
  • Ring 0—Kernel
  • Ring 1—Other OS components that do not fit into ring 0
  • Ring 2—Device drivers
  • Ring 3—User applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Complex Instruction Set Computer (CISC)

A

Uses a large set of complex machine language instructions, which reduces the program size, x86 CPUs.

access calls to main memory are fewer as compared to RISC.

CISC is more powerful than RISC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reduced Instruction Set Computer (RISC)

A

RISC uses a reduced set of simpler instructions.

the commands be shorter and simpler, requiring more individual instructions to perform a complex task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Time multiplexing

A

shares (multiplexes) system resources between

multiple processes, each with a dedicated slice of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

security kernel has three main requirements

A
  • Isolation: It must provide isolation for the processes carrying out the reference monitor concept, and the processes must be tamperproof.
  • Completeness: it must be invoked for every access attempt, impossible to circumvent, and must be implemented in a complete and foolproof way.
  • Verifiability: It must be small enough to be tested and verified in a complete and comprehensive manner.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Type 1 hypervisor (bare metal)

A

is part of an OS that runs directly on host hardware.

VMWare ESX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type 2 hypervisor

A

runs as an application on a normal OS, such as Windows . VMWare Workstation is Type7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Service-Oriented Architecture (SOA)

A

environments “allow for a suite of interoperable services” to be used within multiple, separate systems from several business domains.

“Services are expected to be platform independent” - not dependent upon a particular programming language.

using standard means available within their programming language of choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Polyinstantiation

A

means the database will create two entries with the same primary key: one labeled secret and one labeled top secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Inference

A

is the ability to deduce (infer) sensitive or restricted information from observing available information.

An example of a “database inference control is polyinstantiation”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Aggregation

A

is a mathematical process: a user combines information from separate resources to derive restricted information.

Aggregation is similar to inference, but there is a key difference, as no deduction is required. Aggregation asks every question and receives every answer, and the user assembles restricted information.

Note: to prevent aggregation and inference, we use cell suppression to hide specific cell that contain information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data mining

A

searches large amounts of data to determine patterns that would otherwise get lost in the noise.

Disadvantage: risk of a violation or privacy and integrity risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zachman Framework for Enterprise Architecture

A

provides six frameworks for providing information security, asking what, how, where, who, when, and why and mapping those frameworks across rules, including planner, owner, designer, builder, programmer, and user.

These frameworks and roles are mapped to a matrix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SABSA

A

a holistic life cycle for developing security architecture that begins with assessing business requirements and subsequently creating a “chain of traceability” through the phases of strategy, concept, design, implementation, and metrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Weakness of Bill-LaPadula

A

 No mention of integrity and availability.
 It doesn’t address need-to-know and no mechanism for a one-to-one mapping of subjects and objects
 No policies for changing access data control.
 Contains covert channels and Static in nature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Clark–Wilson uses two primary concepts to ensure that security policy is enforced:

A

Well-formed transactions and

Certification, enforcement, and separation of duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

access control triple are

A
Subject 
Transformation procedure (program) - well-formed transaction
Constrained data item (object) - data that requires integrity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In Clark–Wilson, the assurance is based

A

based upon integrity verification procedures (IVPs) that ensure that data are kept in a valid state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In Clark–Wilson, an audit record is made and entered into the access control system to provide

A

both detective and recovery controls in case integrity is lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Within Clark–Wilson, certification monitors

A

certification monitors integrity

enforcement preserves integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Clark–Wilson requires that users

A

are authorized to access and modify data.

It also requires that data is modified in only authorized ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Lipner

A

combines elements of Bell–LaPadula and Biba together with the idea of job functions or roles to protect both confidentiality and integrity.

Two ways to of implementing integrity:
Lipner’s first method, using only Bell–LaPadula model
Lipner’s second method combines Biba’s integrity model with Bell–LaPadula.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

take–grant protection model

A

a directed graph uses states and state transitions in designing the protection system.

Created to show that it is possible to secure a computer system even when the number of subjects and objects is large.

Rules include take, grant, create, and remove are depicted as a protection graph which governs allowable actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Graham-Denning Model

A

concerned with how subjects and objects are created, how subjects are assigned rights or privileges, and how ownership of objects is managed.

It has three parts: objects, subjects, and rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Harrison–Ruzzo–Ullman (HRU) model

A

maps subjects, objects, and access rights to an access matrix. It is considered a variation to the Graham–Denning Model.

It differs from Graham–Denning because it considers subjects to be also objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Dedicated mode

A

 One classification label only.
 All users can access all data.
 Clearance for all information.
 Need to know for ALL data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

system high mode

A

 The system contains objects of mixed labels (e.g., confidential, top secret,…).
 All subjects must possess a clearance equal to the system’s highest object.
 All users can access some data, based on need to know for SOME data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

compartmented mode

A

 All subjects accessing the system have the necessary clearance.
 All users can access some data, based on their need to know and approval.
 Need to know for SOME data.
 Use of information labels.
 Objects are placed into “compartments” and require a formal (system-enforced) need to know to access. It use technical controls to enforce need to know

29
Q

Multilevel mode

A

stores objects of differing sensitivity labels and allows system access by subjects with differing clearances.

The reference monitor mediates access between subjects and objects

The highest risk of all modes.

30
Q

C1

A

Discretionary Security Protection

31
Q

C2

A

Controlled Access Protection

32
Q

B1

A

Labeled Security Protection

33
Q

B2

A

Structured Protection

34
Q

B3

A

Security domains

35
Q

A1

A

Verified design

36
Q

The equivalent ITSEC/TCSEC ratings are

A

Lowest E0
Highest E6

  • E0: D
  • F-C1,E1: C1
  • F-C2,E2: C2
  • F-B1,E3: B1
  • F-B2,E4: B2
  • F-B3,E5: B3
  • F-B3,E6: A1
37
Q

Target of evaluation (ToE)

A

the system or product that is being evaluated.

38
Q

Security target (ST)—

A

the documentation describing the ToE, including the security requirements and operational environment.

39
Q

Protection profile (PP)

A

An implementation-independent specification for future product., which contains a set of functional and assurance requirements for a specific category of products or systems, such as firewalls or intrusion detection systems.

40
Q

Levels of evaluation

A
  • EAL1. Functionally tested
  • EAL2. Structurally tested
  • EAL3. Methodically tested and checked
  • EAL4. Methodically designed, tested, and reviewed
  • EAL5. Semi-formally designed, and tested
  • EAL6. Semi-formally verified, designed, and tested
  • EAL7. Formally verified, designed, and tested
41
Q

What is used to control the flow of information in the Clark-Wilson model?

A

the access triple rule

user, transformation procedure, and constrained data item.

42
Q

Which component manages the authorized access associations between users and resources?

A

security kernel

43
Q

Which entities control the flow of information in the lattice-based access control (LBAC) model?

A

n upper bound and a lower bound of authorized access for subjects.

44
Q

Which two factors ensure that information is compartmentalized in the information flow model?

A

classification and need to know

45
Q

What determines the security level that is needed to view an object?

A

classification

46
Q

Which system evaluation methods analyze the functionality and assurance of products?

A

Common Criteria (CC) and Information Technology Security Evaluation Criteria (ITSEC)

47
Q

Which security model ensures that the activities performed at a higher security level do not affect the activities at a lower security level?

A

the noninterference model

By implementing this model, the organization can be assured that covert channel communication does not occur

48
Q

Which Rainbow Series book covers security issues for networks and network components?

A

the Red Book

49
Q

Which access control model uses states and state transitions in designing the protection system?

A

the Take-Grant model

50
Q

What are the four phases of NIACAP?

National Information Assurance Certification and Accreditation Process

A

definition, verification, validation, and post accreditation

51
Q

Simple Object Access Protocol (SOAP)

A

is a protocol specification for exchanging structured information in the implementation of web services and networked environments.

52
Q

Threat modeling vs. Vulnerability analysis

A

Threat modeling identifies potential threats and attack vectors.

Vulnerability analysis identifies weaknesses and lack of countermeasures.

53
Q

What techniques can be used to enforce process isolation?

A

virtual memory,

object encapsulation treats a process as a “black box,”

Time multiplexing shares (multiplexes) system resources between multiple processes, each with a dedicated slice of time as an example.

54
Q

EPROM

A

can be erased by ultraviolet light

55
Q

EEPROM

A

ay be “flashed,” or erased and written to multiple times electronically. EEPROM is a modern type of ROM.

56
Q

To prevent aggregation and inference, we use

A

cell suppression to hide specific cell that contain information.

57
Q

Database inference control is

A

polyinstantiation.

58
Q

Database aggregation controls may include

A

restricting normal users to a limited amount of queries.

59
Q

hotfix

A

repairs to a computer during its normal operation so that the computer can continue to operate until a permanent repair can be made.

60
Q

Patches

A

temporary fixes to a program.

Once more data is known about an issue, a service pack or hotfix may be issued to fix the problem on a larger scale.

61
Q

A multilevel lattice model

A

A multilevel lattice model describes strict layers of subjects and objects and defines clear rules that allow or disallow interactions between them based on the layers they are in.

62
Q

What is the purpose of ring protection?

A

used to control interactions between different execution domains with different levels of privilege, via API.

63
Q

What is pipelining?

A

combines multiple steps into one combined process, allowing simultaneous fetch, decode, execute, and write steps for different instructions.

64
Q

What is pipeline stage?

A

each stage in is called a pipeline

65
Q

What is pipeline depth?

A

is the number of simultaneous pipeline stages that may be completed at once.

A CPU without pipelining would have to wait an entire cycle before performing another computation.

66
Q

To ensure that integrity is attained, three following integrity goals:

A

 1) Data is protected from modification by unauthorized users;
 2) Data is protected from unauthorized modification by authorized users by implementing separation of duties, which divides an operation into different parts and requires different users to perform each part.
 3) Data is internally and externally consistent.

67
Q

To prevent aggregation and inference, we use

A

cell suppression to hide specific cell that contain information.

68
Q

Database inference control is

A

polyinstantiation

69
Q

Database aggregation controls may include

A

restricting normal users to a limited amount of queries.