Security Engineering (Domain 3) Flashcards

1
Q

System which can simultaneous support separate execution domains for different subject.

A

Multi-user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A program in execution that works in its own address space and can only communicate with other processes in a controlled manner.

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Memory allocation for programs.

A

Real Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Read-Only Memory

A non-volatile storage facility that generally is not updatable without replacing the ROM chip.

A

ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Manner of a system moving from one state to another (i.e.: initialization state to ready state).

A

State Transition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A system that has the necessary controls to ensure that the security policy will not be compromised and that it can process a range of sensitive or classified information simultaneously.

A

Trusted Computer System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A British risk-based method for assessing, evaluating, and managing risk. It is a standard and a framework for developing a security program.

A

7779 Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security model that provides access controls that can change dynamical depending upon a user’s previous actions. The main goal is to protect against users accessing data that could be seen as conflicts of interest. Also known as the Chinese Wall model.

A

Brewer and Nash Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A covert channel that involves direct or indirect writing to a storage location by one process and the direct or indirect reading of the storage location by another process. Covert storage channels typically involve a finite resource that is shared by two subjects at a different security levels.

A

Covert Storage Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security model that defines a set of basic rights in terms of commands that a specific subject can execute on an object.

A

Graham-Denning Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Instructions within a program’s code that enable the developer or maintainer to enter the program without having to go through the usual access control and authentication processes. They should be removed from the code before being released for production otherwise; they can cause serious security risks. Also called trapdoors.

A

Maintenance Hook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A part of the asymmetric key pair that must only be known and used by the owner

A

Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Also called packet replay, an attack based on capturing and resending packets on a network. This type of attack can be used against certain cryptographic standards.

A

Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure Electronic Transactions – A security technology proposed by Visa and MasterCard to allow for more secure card transaction possibilities.

A

SET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A form of IPSec communication where the payload of the message is protected. This occurs with direct forms of communication between hosts (i.e. between a client and a server).

A

Transport Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The hardware and software implementation of cryptography that transforms a message to ciphertext and back to plaintext.

A

Cryptosystem

17
Q

Elliptic Curve Cryptography – Cryptographic procedures based upon elliptic cure mathematics.

A

ECC

18
Q

A variable-length one-way hash function that is a modification of MD5.

A

HAVAL

19
Q

In the context of cryptography, a secret value in the form of a sequence of characters used to encrypt and decrypt messages.

A

Key

20
Q

A one-way hash function. It produces 128 bit hash, or message digest values. It is used for high-speed computation in software implementations and is optimized for microprocessors.

A

MD4

21
Q

A perfect encryption scheme because it is unbreakable by brute force and each pad is used exactly once.

A

One-Time Pad

22
Q

Certificate Authority – A trusted entity to all relevant parties that maintains and issues digital certificates.

A

CA

23
Q

Also called Triple DES or EDE (encrypt,decrypt,encrypt), a secret key encryption algorithm based on repeated application of the Data Encryption Standard (DES).

A

3DES