Security Architecture and Engineering Flashcards

1
Q

Which type of public key (Asymmetric) algorithm are “quantum resistant”?

A

Lattice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 Categories of Fire Detection

A
  • Smoke Sensing
  • Flame Sensing
  • Heat Sensing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Ciphers

A

Stream cipher
Block cipher
Substitution Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

API types

A
  • REST
  • Web
  • SOAP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In REST API, What REST stands for…

A

Representational State Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

About REST API

A
  • REST Architectural Style
    Web Services for; Web, mobile and desktop applications
  • Uses HTTP; GET POST PUT DELETE
  • Uses JSON and XML
  • Stateless client-server model
  • Scalable and Easy to maintain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When to use REST API?

A
  • Non complex simple applications uses CRUD ops
  • Building web services that require a stateless, scalable, & easy-to-main architecture.
  • Apps with CRUD(creating, reading, updating & deleting data)
  • e.g. WhatsApp
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Web API?

A
  • Stateless or Stateful
  • Primary purpose is to provide a platform-independent interface
  • it uses HTTP, HTTPS, and TCP/IP to communicate between the clients and servers
  • Doesn’t follow a special architecture or structure
  • Flexible interface
  • Good for complex applications with integration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When to use Web API?

A

When building complex applications that require integration with different systems and technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SOAP (API) stands for

A

Simple Object Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

About SOAP API

A
  • Used for exchanging structured data between different applications
  • uses XML
  • Wide range of data types; text numbers, dates and binary
  • Supports; HTTP, SMTP, and FTP
  • Set of rules
  • WSDL or UDDI protocol
  • Digital Signatures
  • Enterprise level apps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When to use SOAp?

A
  • Apps require a highly secure and reliable method of exchanging data between applications.
  • Complex data structures and logic apps
  • Digital Signatures and Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CASB stands for

A

Cloud Access Security Broker.
It is a security policy enforcement solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CASB - 2 Primary deployment methods

A
  • On Premise based solution
  • Cloud based solution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CASB Roles

A
  • Provide Visibility into cloud use. Shadow IT
  • Data Loss Prevention (DLP) Services
  • Inject Encryption into the cloud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of encryption algorithms hold up to the power of Quantum Computing

A
  • Symmetric
  • Shared key, bulk encryption (fast)
  • Holds up fairly well to quantum computing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Code Vs. Cipher

A
  • Code is sometimes secret and dont always provide confidentiality
  • Ciphers are always mean to hide the true meaning of a message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Example of Stream Ciphers

A

Caesar
Vigenere
One-time pad
(Difference is key length)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fast and Strong Crypto keys

A
  • Symmetric —> Fast
  • Asymmetric —> Strong
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HASH function Requirements

A
  1. They must allow input of any length
  2. Provide fixed-length output
  3. Make relatively easy to compute the hash function for any input
  4. Provide one-way functionality
  5. Must be Collusion free.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DoS Examples

A
  • SYN Flood attack
  • Smurf attack
  • Ping-of-death attack
  • Teardrop attack
  • Fraggle attack
  • Land Attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An Architecture describes

A
  • The designed structure of something.
  • A system architecture, then, is a description of how specific components are deliberate put together to perform some actions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Client-Based Systems are

A

Embodied in applications that execute entirely on one user device such as workstation or smartphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Sever-Based Systems ( client/server systems)

A

Require that two or more separate applications interact with each other across a network connection in order for users to benefit from them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A Database Management System (DBMS) is a
Software system that allows you to efficiently create, read, update and delete (CRUD) any given set of data.
26
DBMS transactions
Which a term describes the sequence of actions required to change the state of the database.
27
A foundational principle in database transactions is referred to as their ACID Properties, which stands for:
- A - atomicity: Entire transaction succeed or roll backs - C - consistency: strictly follows all applicable rules - I - isolation: parallel transactions happen in isolation to avoid corruption - D - durability: completed transactions stored.
28
DBMS: database introduces 2 specific issues:
- Aggregation: is an act of combining information from separate sources. - Inference: is the ability to derive information not explicitly available
29
DBMS: - content-dependent access control - context-dependent access control
- content-dependent access control: is based on the sensitivity of the data - context-dependent access control: that software understands what actions should be allowed based on the state and sequence of the request
30
High-Performance Computing Systems
HPC is the aggregation of computing power in ways that exceed the capabilities of general-purpose computers for the specific purpose of solving large problems.
31
Industrial Control Systems ( ICS)
Consist of information technology that is specifically designed to control physical devices in industrial processes.
32
Paramount of the Industrial Control Systems (ICS) is
1. Safety of the workers 2. Availability
33
A good resource for ensuring ICS (Industrial Control Systems) safety, security, and availability is NIST….
NIST SP 800-82 Revision 2
34
Industrial Control Systems (ICS) 3 devices
- Programmable Logic Control (PLC) - Human-Machine Interface (HMI) - Data Historian
35
Distributed Control System (DCS) is a
Network of control devices within fairly close proximity that are part of one or more industrial processes.
36
Supervisory Control and Data Acquisition (SCADA) systems were…
Developer to control large scale physical processes involving nodes separated by significant distances.
37
Main Conceptual differences between DCS and SCADA are
Size and distances.
38
SCADA systems typically involve three kinds of devices:
- Endpoints (Remote Terminal Unit) - Backends (Data acquisition server) - User Stations (Human Machine Interface)
39
The most important principle in defending OT systems is to isolate them from the….
Public Internet, either logically or physically
40
Virtual systems are…
Those that exist in a software-simulated environments
41
Virtual Machines (VMs) are..
Entire computer systems that reside inside a virtual environment.
42
Hypervisor is the…
Central program that controls the execution of the various guest operating systems and provides the abstraction level between the guest and host environments
43
Type 1 Hypervisor…
Runs directly on hardware or bare metal and manages access to it by its VMs.
44
Type 2 Hypervisor…
Runs as applications on OS
45
Hypervisors allow you to have…
One computer running several different operating systems at one time
46
Containerization
- As Virtualization matured, a new branch called containerization emerged. A container is an application that runs in its own isolated user space.
47
Example of Container (Big names)
- Dockers on the commercial side - Kubernetes as the open-source alternative
48
NIST on Container…Application Container Security Guide
NIST SP 800-190
49
Microservices…
A common use of containers is to host microservices, which is a way of developing software where, rather than building one large enterprise application.
50
Microservices….log aggregation
Where as Microservices are decentralized, we want to log them in a centralized fashion so we can look for patterns that spans multiple services and can point to malicious intent.
51
Serverless
In a server-less architecture, the services offered to end users, such as compute, storage, or messaging, along with their required configuration and management, can be performed without requirement from the user to set up any server infrastructure.
52
Cloud Computing is the
Use of shared, remote computing devices for the purpose of providing improved efficiencies, performance, reliability, scalability, and security.
53
Generally three models for cloud computing services, they are
- Software as a Service (SaaS) - Platform as a Service (PaaS) - Infrastructure as a SeService (IaaS)
54
Cloud Deployment Models
- A Public Cloud - A Private Cloud - A Community Cloud - A Hybrid cloud
55
Pervasive Systems
Pervasive Computing ( ubiquitous computing or Unicomp) is the concept that small (even tiny) amounts of computing power are spread out everywhere computing is embedded into everyday objects that communicate with each other, often with little or no user interaction, to do very specific things for particular customers.
56
Embedded systems (aka Cyber-Physical Systems)
Is a self-contained computer system ( that is, it has its own processor, memory, and IO devices) designed for very specific purpose.
57
IoT (Internet of Things)
IoT is the global network of connected embedded systems. Each node is connected to the internet and is uniquely addressable
58
Issues with IoT
- Authentication - Encryption - Updates
59
Distributed Systems
- Is one in which multiple computers work together to do something. - we could then say that a distributed system is any system in which multiple computing nodes, interconnected by a network, exchange information for the accomplishment of collective tasks. - Another approach to distributed computing is found in peer-to-peer systems, which are systems in which each node is considered an equal to all other.
60
Popular examples of peer-to-peer systems
- BitTorrent - Onion Router (TOR) - Cryptocurrency like bitcoin
61
Edge Computing Systems
Is a distributed system in which some computational and data storage assets are deployed close to where they are needed in order to reduce latency and network traffic.
62
Edge Computing architecture has 3 layers
1. End devices 2. Edge Devices 3. Cloud Infrastructure
63
Cryptography is the
Practice of storing and transmitting information in a form that only authorized parties can understand
64
Cryptanalysis is the
Name collectively give to techniques that aim to weaken or defeat cryptography
65
Together Cryptography and Cryptanalysis comprise….
Cryptology
66
Around 600 B.C. Hebrew invented cryptographic method called….
atbash
67
atbash is an example of ________ cipher
Substitution
68
Mono alphabetic substitution uses
Only one alphabet
69
Polyalphabetic substitution cipher uses
Multiple alphabets
70
Around 400 B.C. the Spartans used a system of encrypting information in which
They would write a message on a sheet of papyrus (a type of paper) that was wrapped around a staff which was then delivered and wrapped around a different staff by recipient. Scytale cipher is and example transposition cipher
71
In Rome, Julius Caesar (100-44 B.C.) developed a simple method of shifting letters of alphabet…
Simply shifted the alphabet by three positions
72
DES (Data Encryption Standard) was used worldwide for financial and other transactions, and was embedded into numerous commercial applications. Adopted from…
IBM developed Lucifer
73
DES was cracked in ______, and after few years replaced by ______
1990s, Advanced Encryption Standard (AES)