Security Architecture and Engineering Flashcards

1
Q

What are the types of security model

A
Mandatory Access Control (MAC)
Modes of Operation
Confidentiality: Bell-LaPadula
Integrity: Biba
Lattice
Commercial: Clark-Wilson
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Mandatory Access Control (MAC)

A

Read down, write up

can only access object if the subject clearance is equal to or greater than the object’s label (Top Secret, Secret, etc..)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four types of Modes of Operation

A

Dedicated
System High
Compartmented
Multilevel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Dedicated mode of operation

A

only contains object of one classification label (e.g. Top Secret)
Need to have clearance of equal to or higher to access the object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is System High mode of operation

A

contains mixture of labels (confidential, secret, top secret)
Need to have clearance of the highest object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Compartmented mode of operation

A

all subjects have necessary clearance but don’t have formal access approval or Need to Know

Uses technical control to enforce need to know vs policy basis need to know

Formal access approval for SOME information they will access on the system.

A valid need to know for SOME information on the system.

All users can access SOME data, based on their need to know and formal access approval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Multilevel mode of operation

A

stores objects at different labels

allow access by subject with different clearances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Bell-Lapadula security model

A

Confidentiality
No Reads up
No Write Downs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Bell-Lapadula - Strong

A

Stuck at level

Can only perform operations at that level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 2 types of Bell-Lapadula tranquillity

A

Weak Tranquility property - the label of the subject and the object can’t change to violate defined security policy

Strong Tranquility property - label never change during operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Biba security model

A

Integrity (think of time, isn’t confidential, but requires integrity)

No read downs, no write up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which security model deal with integrity

A

All the model contains the letter I

Biba
Clark-Wilson
Non-Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Lattice security model

A

Confidentiality

Deals with data flow

No read up, no write down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Clark-Wilson model

A

internal/external consistency

Authorized users cannot make unauthorized changes

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the State Machine model

A

Captures current security posture

Test all paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Research model

A

used to research the best security posture

Information Flow Model, Bell-Lapadula is one of them

Non-interference - High level action does not determine low level user visibility (NSA and pizza story)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Chinese Wall model

A

No information flow is allowed that could cause information leakage that could lead to conflict of interest

Treat them as separate companies

aka Brewer Nash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Trusted Computing Base (TCB)

A

all components are properly implemented and secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Reference Monitor

A

Mediates all access between object and subjects

Checks to ensure they are authorized to view/access objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Domain Separation

A

group of object with same security requirement

e.g. Top Secret object, HR department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is COI

A

Conflict of Interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the 3 types of Domain Separation

A

Execution Rings

Base Address Registers

Segment Descriptors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the 4 Orange Book classes

A

A. Verified Protection (MAC +
B. Mandatory Protection (Mandatory Access Control)
C. Discretionary Protection (Discretionary Access Control)
D. Minimal Protection (e.g your laptop)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the key principles of The Orange Cook

A

Functionality - how well does it operate
Effectiveness - how secure is it
Assurance - can we prove it is secure
Lifecycle assurance -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is ITSEC F1-F5

A

Mirror functionality of The Orange Book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is ITSEC F6

A

High Integrity Requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is ITSEC F7

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is ITSEC F8

A

High integrity for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is ITSEC F9

A

High confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is ITSEC F10

A

High confidentiality and integrity for data network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Target of Evaluation (TOE)

A

System or product being evaluated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Security Target (ST)

A

documentation describing TOE, including security requirements and operational environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Protection Profile

A

independent set of security requirements for specific product or system

e.g. Fire, IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Evaluation Assurance Level (EAL)

A

Evaluation score of the tested product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

EAL 1

A

Functionally tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

EAL 2

A

Structurally tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

EAL 3

A

Methodically tested and checked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

EAL 4

A

Methodically designed, tested, and checked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

EAL 5

A

Semi-formally designed and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

EAL 6

A

Semi-formally verified, designed, and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

EAL 7

A

Formally, verified, designed, and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the 2 parts of the CPU

A

Arithmetic Logic Unit (ALU)

Control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is Fetch-Decode-Execute cycle

A

Fetch - retrieves information
Decode - understand the instructions
Execute - instructions executed and stored in a register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Fetch-Decode-Execute (no pipeline)

A

Sequential

Book 3.3 slide #4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Fetch-Decode-Execute (pipeline)

A

Pipeline is hardware

Instead of doing it one at a time, can do multiple

Book 3.3 slide #4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Complex-Instruction-Set-Computer (CISC)

A

Long command

x86 CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Reduced-Instruction-Set-Computer (RISC)

A

Short command

ARM CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is multitasking

A

Multiple tasks concurrently on one CPU

Heavy Weight - each has own copy of dll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is multithreading

A

multiple threads concurrently on one CPU

Light weight, point to a copy of the dll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is multiprocessing

A

multiple task at the same time with multiple CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are the 3 types of Memory Protection

A

Process Isolation

Address Space Layout Randomization (ASLR)

Non eXecutable (NX) Stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Process Isolation

A

prevents one process from affecting another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Address Space Layout Randomization (ASLR)

A

randomizes address used by programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Non eXecutable (NX) Stack

A

marks pages of the stack non executable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Virtual memory

A

swapping memory to disk

think disk paging (oldest on disk, newest in RAM)

doesn’t correspond directly to physical memory

Threads use virtual address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Direct Addressing (memory addressing)

A

exact location in memory to execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Indirect Addressing (memory addressing)

A

pointer to location in memory to execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Register Direct Addressing (memory addressing)

A

refer directly to specific register that already contains the data.

Register are temp storage for the task teh CPU works on at that instant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Register Indirect Addressing (memory addressing)

A

pointer - looks for specified register

Register are temp storage for the task teh CPU works on at that instant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Index Addressing (memory addressing)

A

Memory location plus offset

Think of an array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Layering (OS)

A

Think OSI model

Works with layer above and below it and work independently. If one layer fails, should not affect other other layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Abstraction (OS)

A

Think of saving file

reduce complexity and hide the inner working of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are the 4 layer of Ring Layers of CPU

A

Ring 3: Applications and utilities
Ring 2: I/O drivers and utlities
Ring 1: OS component not part of kernel
Ring 0: Kernel

All modern OS, only uses ring 0 and 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Trust Platform Module (TPM)

A

think of motherboard. TPM use to authenticate integrity of the BIOS

**Full disk encryption, if you don’t have TPM can’t decode to use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Hypervisor

A

runs on the host, controlling the VM and their access to the hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is full virtualization

A

run unmodified applications or OS designed to run directly on computer hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is Paravirtualization

A

runs specially modified applications or OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Unique requirements for VM

A

**Protect Hypervisor - Must remain secure!!!

Protect special host (such as drag and drop)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is a database

A

collection of related data intended for sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is Database Management System (DBMS)

A

Stores data and provides operation CRUD and search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What are the 4 types of data model

A

Hierchial
Mesh
Object-Oriented
Relational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Semantic Integrity

A

Wrong data type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Entity Integrity

A

Primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Referential Integrity

A

Foreign key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Concurrency

A

locking so two users can’t update at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Commit

A

writes changes to DB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

2-Phase commit

A

distributed DB, if commit cannot happen on all db, rollback changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Checkpoint

A

snapshot of database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Database Journal

A

log file of db changes in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Data Warehouse

A

used for queries, does not affect current system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Data Mining

A

looking for something wrong, fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Aggregation

A

example - download the entire phone book

iterate through the entire collection to get all the info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Inferences

A

able to find out information of high level from lower level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What is Inference Controls

A

Enforced during query processing (think of CIA and pizza)

Content-Depended access rules (think of phone book and asking for more than 5 at a time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Shadow database

A

Active - Passive

2 database, 1 mirrors the other. Only one takes the transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What is active-active db

A

Two DB synch, both writing transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is active-passive

A

Two DB synch, one mirrors the other and only one writes transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What is an applet

A

Functions w/o sending users request back to the server

Remote code exec on client, additional risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What is Active X

A

MS version of applet

*Code Signing

90
Q

What is same-origin policy

A

Protocol, host and port must be same

http(protocol) bank.example.com (host) port 80

91
Q

Whitelisting

A

only allows specific characters

Whitelisting superior to blacklisting

92
Q

Blacklisting

A

rejects specifics characters and allows all others

93
Q

Supervisory Control System

A

Gathers data

Sends command

94
Q

Remote Terminal Unit

A

aka Remote Telemetry Unity
Connects devices to SCADA Network
converts analog data to digital

95
Q

Human-Machine Interface (HMI)

A

Presents data to the operator

96
Q

What are the security issues in SCADA

A

Older & unpatched
Default credentials
Serial ModBu and Modbus TCP have no built in security
Relied on network separate for security (internet causing issues)
Easily accessible via simple tools like SHODAn

97
Q

Cryptology

A

study of secure communications

Contains both Cryptography and Cryptoanalysis

98
Q

Cryptography

A

study of rendering messages indecipherable except to the intended recipients

99
Q

Cryptoanalysis

A

study of breaking code

100
Q

Cryptosystem

A

System design to encrypt

101
Q

Definition of Cryptography

A

hidden writing

102
Q

Plaintext

A

message in original form

103
Q

Ciphertext

A

message in encrypted form

104
Q

Encryption

A

creating of ciphertext from plaintext

105
Q

Decryption

A

ciphertext back to plaintext

106
Q

Cipher

A

aka cryptographic algo

107
Q

Work Factor

A

how long it takes to break

108
Q

Entropy

A

amount of randomness

109
Q

Exclusive (XOR)

A

boolean - plaintext to encryption and then back example (pg 108 book 3)

1- true
0 false

Input same - 0
Input different - 1

110
Q

Confusion

A

destroy pattern key to ciphertext

111
Q

Diffusion

A

destroy pattern plaintext to ciphertext

112
Q

Rotation Substitution

A

shift number of characters a set number of spaces

ROT3/ROT13

113
Q

Arbitrary Substitution

A

Replace one letter for another

114
Q

Polyalphabetic Cipher

A

Multiple alphabets

115
Q

Permutation

A

Rearranges the order of the characters (think anagram)

116
Q

One-Time Pad

A

Cannot Be broken
Truly random
Pads are kept secure - not intercepted
Each key is used once and never used

117
Q

What are the Cryptography Lifecycle

A

Cryptographic limitations
Algorithm Selection
Protocol Governance
Key Managment

118
Q

What are the two ways to encrypt data

A

Block by block encryption

Encrypt the entire stream

119
Q

What are the goals of the cryptography

A

Contains at least one or more of the items below
Confidentiality - secrets remain secrets
Data Integrity - data not altered
Authentication - providing identity claim
Non-Repudiation - can’t deny you did it. - this is combines data integrity and authentication

120
Q

Non-Repudiation

A

combines data integrity and authentication

Can’t deny you did something

121
Q

Symmetric

A

single key encrypt/decrypt

122
Q

Asymmetric

A

two key to encrypt/decrypt

123
Q

Hashing

A

“integrity” & Fixed Length

one way encryption
using algorithm with no key encryption

124
Q

DES: Data Encryption Standard

A

Describes the data encryption algorithm (DEA) - cipher
64 bit block
56 bit key size

125
Q

What are types of cipher mode

A
Electronic Codebook (ECB)
Cipher Block Chaining (CBC)
Output Feedback (OFB)
Cipher Feedback (CFB)
Counter Mode (CTR)
126
Q

What is Electronic Codebook (ECB)

A

Does not destroy pattern
Weakest of modes
No chaining

127
Q

What is Cipher Block Chaining (CBC)

A

requires IV
ensures confidentiality for known text
Chaining - ciphertext use as input for next plaintext encryption

128
Q

Output Feedback Mode (OFB)

A

Streaming Cipher
1 bit
Requires IV
does not propagate errors

129
Q

Cipher Feedback Mode (CFB)

A
Similar to CBC, but streaming not block
1 bit
Feedback like chaining
Requires IV
Errors will propagate
130
Q

Counter Mode (CTR)

A

Streaming Cipher
Use counter as IV
Doesn’t propagate error

131
Q

What are DES Weaknesses

A

crackable short time

Small keyspace, brute force

132
Q

Triple DES

A

3DES
TDEA (remember this)
Three rounds of DES

133
Q

Double DES

A

Meeting the middle flaw issue

134
Q

How does Triple DES work

A

Encrypt, Decrypt, Encrypt
3 Different Key
Backward compatible with single DES

135
Q

International Data Encryption Algorithm (IDEA)

A

Key length - 128 bit
Block size - 64 bit
slower than AES

136
Q

Advance Encryption Standard (AES)

A

Underlying - Rijndael
Symmetric block ciper
Block size: 128 bits
Variable key length: 128, 192, 256 bits

137
Q

What are the 4 AES basic functions

A

SubBytes - Substitute bytes
ShiftRows - Shift rows (rotation)
MixColums - Mixes Columns
AddRoundKey - XOR (boolean) state with a subkey at the end of each round

138
Q

Blowfish

A

Symmetric block cipher
Block size - 64 bit
Key length - 32-448 bit

139
Q

Twofish

A

Symmetric block cipher
Block size - 128 bit
Key length - 128,192,56 bit

140
Q

RC5

A

Symmetric block cipher
Block size - 32,64, 128 bit
Key length - 0-2040 bit

141
Q

RC6

A

Symmetric block cipher
Block size - 128 bit
Key length - 128,192, 256 bit

142
Q

Tractable Problems

A

Easy problems

Think prime number times each other

143
Q

Intractable Problems

A

Hard problem, cannot be solved quickly

Example 391 is what number x what number

144
Q

Diffie-Helman Key Exchange

A

Does not provide confidentiality, not encryption

exchange symmetric key via public channel

145
Q

Exponentiation

A

9^13

146
Q

Logarightms

A

Opposite of Exponentiation

147
Q

Digital Signatures

A

Authentication and integrity
proves it was signed and not changed
Asymmetric encryption and hash (RSA & SHA-1)

148
Q

What are three steps to digital signatures

A

Plaintext -> Hash - > Asymmetric Encryption

149
Q

Digital Signature Creation

A

Encrypt Private Key

150
Q

Digital Signature Verification

A

Decrypt with Public key

151
Q

Hash Message Authentication Code (HMAC)

A

Symmetric

Authenticate holder of symmetric key and verifies integrity

152
Q

What is Public Key Infrastructure used for (PKI)

A

Creating certs
Maintaining Certs
Revoking Certs

153
Q

What are the 5 components of PKI

A

Certificate Authority - issues/revokes certs
Organizational Registration Authority (ORA) vouch for the binding between public key and cert holder
Cert holder - sign digital certs
Clients that can validate digital signature
Central Repo

154
Q

How does PKI work

A

User A trust PKI server A: Therefore User A trust
any server signed by Server A
Any cert signed by Server A
any cert or server trust by Server A

155
Q

What are the trust model for CA

A

Hierarchical - Tree/leaf
Bridge - joining two organization CA
Mesh - 3 or more AC to trust each CA w/Hierarchical
Hybrid - some combination of the three

156
Q

PKI Cert Lifecycle

A
Registration
Creation
Distribution
Validation
Key Recovery
Expiration
Revocation
157
Q

Certificate Revocation List (CRL)

A

Entire list must be downloaded
CRL download can be network intensive
No real time notification

158
Q

Key Escrow

A

Split key in half - Separation of duties

159
Q

Pretty Good Privacy (PGP)

A

Symmetric, asymmetric, and hash cipher
Digital Signatures
secure communication w/o pre-sharing keys
Decentralized

160
Q

Transport Encryption

A

End to end encryption
e.g VPN
Focus on confidentiality but properly configured provide confidentiality, integrity, authentication, and non-repudiation

161
Q

TLS & SSL

A

TLS 1.0 is SSl 3.1
backward compatibility with SSL
TLS current version 1.2

162
Q

SSL/TSL Warning

A

sign of man in the middle attack

DNS poisioning

163
Q

IPSEC

A
Authentication Header (authentication/integrity, digital signature)
*AH - does not provide confidentiality
Encapsulating Security Payload (ESP) - confidentiality, integrity, and authentication. 
ESP protects data, NOT the header
164
Q

IPSEC Security Association

A
One way (simplex)
Bidirectional communications requires 2 SA
165
Q

Perfect Forward Secrecy (PFS)

A

Key 1 generates key 2
If key 1 compromised
Key 2 still secure

166
Q

Secure Shell (SSH)

A
replaced telnet, fpt
provides secure network terminal access and file transfer
port 22
SSHv1 - man in the middle attack issue
SSHv2 is preferred over SSHv1
167
Q

Known plaintext

A

some of plaintext is known as well as portion of ciphertext

Used that to figure out the rest…thing uboat/enignma

168
Q

Chosen plaintext

A

choose what gets encrypted to get the outpout

169
Q

Adaptive chosen plaintext

A

chosen plaintext with iterations based on knowledge of the output

170
Q

Chosen Key Attack

A

know something about the key (e.g. numbers only, upper case)

reduce number of characters to try

171
Q

Analytical attacks

A

use algo and math to figure out key

reduce the portion to be searched

172
Q

Statistical attacks

A

use statistical character of language or weakness in key

173
Q

Differential attacks

A

analyze results difference based on plaintext using a crypto key

think of example of making every 10 character an upper case X

174
Q

Linear attack

A

linear analysis of pairs of plaintext and ciphertext

175
Q

Differential linear attack

A

applying differential analysis with linear analysis

176
Q

Side-Channel attack

A

Use physical data to break crypto system

monitor CPU

177
Q

Birthday Attack

A

deals with hash collision

178
Q

Steganography

A

Data hiding

Images, word document, text documents

179
Q

Contraband checks

A

x-ray, metal detectors

180
Q

What are the types of facility control

A
Fences
Landscape
Vehicle barriers
Guards
Dogs
Badges
Lights
Motion detectors, sensors, and alarms
181
Q

Fences

A

3-4 ft/ 1 meter - deter causal trespasser
6-7ft / 2 meters - too high to easily climb
8 ft / 2.4 meters + 3 strands of barb wire - prevents determined intruder

182
Q

Gates

A

Class I - residential
Class II - commercial (parking garage)
Class III - Industrial (loading dock/factory)
Class IV - restricted access (prison/airport)

183
Q

Mantraps

A

Think of bank processing facility
Physical preventive control
Entrance protected by 2 doors
Intruder confined between 2 doors

184
Q

Restricted Area

A

Establish restricted and non-restricted area to determine perimeter
Escort from restricted area (employee/guard)
Perimeter of restricted area (space/time)

185
Q

How to deter unauthorized access

A

Educate - Employees only sign

Discourage - Psuedo-guard (unarmed)/prosecuted sign)

186
Q

Security guards

A
Duties
Checking entrance credentials
Issue/removing visitor badge
Monitor CCTV
Guards be trained and have complete and clear orders
Guards are expensive
187
Q

Dogs

A

**Main issue - Liability
deployed for perimeter security in controlled/enclosed area
Better are hearing and seeing at night
cost incur beyond basic feed and care (e.g insurance and liability)

188
Q

What is required lighting

A

2 candle power

Install lighting at least 8 ft high (2.4 m) and illumination of 2-foot candles

189
Q

Types of motion detectors, sensors and alarms

A

Motion (sonic sounds, ultrasonic sounds, microwave (radio waves))
Photometric - IR
Acoustical-sesmic detection - microphone
Proximity - electronic field sense presense

190
Q

Site Selection

A

Visibility
Local consideration (hazards, crime rate)
Natural disaster (earthquake, flood, etc..)
Transportation (easy access to transit, high traffic area)
Shared tenancy (HVAC)

191
Q

Facility design

A

Slab to slab
Wall - Fire rating - 1 hr
Door- solid/hollow core

192
Q

Enclosed areas

A

Slab to Slab wall - so intruder can’t sneak underneath etc..

193
Q

Doors

A

make sure which way the door swings to make sure when it open not block critical exit point
Doors open out, not in!
Fire rating equal to walls

194
Q

Windows

A
Laminated glass
Wired glass
Solar window films
Security film
Glass Breakage
Bulletproof
Explosive resistant
195
Q

Locks

A

Preventive control

lock bumping - shave points down on key

196
Q

Combination lock

A

no accountability - don’t know who unlocked it.

197
Q

Physical Security

A

Overlooked because assume already in place
Should be:
Risk-based
Focused on critical intellectual property (IP)
Balance with safety

198
Q

Wiring closets

A

avoid spaghetti cable

don’t intermingle power and network cable

199
Q

Wiring closets

A

closets should be secure

Demarc should be secure

200
Q

Server room

A

all three dimension (floor, ceiling wall) should be secure
all walls, doors, windows, floors, ceilings - 1 hour fire rating
Slab to slab walls

201
Q

Media storage

A

Stored off site and encrypted
Strict procedures
use bonded and license company for off-site storage
Make sure not impacted by same disaster

202
Q

Earthquakes

A

Detective - structural assessment

Corrective - structural reinforcement, evacuation

203
Q

Floods

A

Detective - detectors (moisture, humidity)

Corrective - bilge pump, evacuation

204
Q

HVAC

A

Positive Pressure - bad stuff goes out
proper temp and humidity level
Design for computers, no human

205
Q

HVAC Temp & Humidity

A

Temp - 70-74 degrees / 21-23 celcius
Humidity -40-60 % (50 % + or - 10)

Low humidity - static
High humidity - moisture (rust)

206
Q

Humidity

A
Maintain proper humidity level
Anti-static spray
Anti-static flooring
Grounding buildings and computers properly
Anti-static table covering
Anti-static floor mats
207
Q

Electrical Power

A
Fault: momentary power loss
Sag: momentary low voltage
Brownout: prolonged low voltage
Blackout: loss of all power
Spike: momentary high voltage
Surge: prolonged high voltage
Transient: short duration noise interference
208
Q

Smoke & Fire

A

Detective: smoke detectors, heat sensors, flame
Suppressive: sprinkler, extinguishers

209
Q

Smoke detectors

A

change in ionization

change in light beam

210
Q

Fire Detectors

A

sense pulsation of flame

Need line of sight

211
Q

Fire Classes (A-D)

A

A: Think ash (wood) - Suppression - water
B: Liquid (Banana Suit) - Suppression - soda acid
C: Conductive (electrical) - Suppression - gas
D: Combustible Metal - dry powder

212
Q

Fire Suppression

A

CO2 & soda acid remove fuel and oxygen
Water reduces temperature
Gas (Halon/Halon Sub) interferes with chemical reactions between elements

213
Q

Fire Suppression Systems

A
Zones of coverage
Time-release
HVAC off before activation
Water and gas (Halon)
Gas best used in pre-action, time delayed mode: 
Halon <10% breathed in healthy person.
214
Q

Wet pipe

A

filled with water

activated once reaches 165 degrees, material melts

215
Q

Dry Pipe

A

not filled with water - held back

activated once reaches 165, valves open

216
Q

Pre-action

A

hybrid between wet & dry pipe

217
Q

Deluge

A

similar to dry pipe, larger amount of water

218
Q

Gas discharge

A

Halon

installed under the floor of computer area

219
Q

Portable extinguishers

A
50 feet of electrical equipment
At exits
clearly marked with unobstructed view
Easily reached and operated by average size person
inspected regularly
220
Q

Water (Fire)

A

fire protection and insurance support use of water are primary fire extinguishing agent for all business environment.

221
Q

CO2

A

Colorless, odorless and potentially lethal cause it removes oxygen
Gas mask - no protection
best use - unattended facilities
built in delay for manned areas

222
Q

Halon

A

Must be thoroughly mixed with air
1/1/94 - have to stop using it -releases ozone depleting substances
FM-200 - most effected replacement
FM-13 breathable up to 30% concentration