Supply chain assessment Flashcards

1
Q

Trusted foundry

A

A microprocessor manufacturing utility that is part of a validated supply chain (Where hardware and software does what the documentation says it does), this is operated by the DoD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hardware Source Authenticity

A

The process of ensuring that hardware is procured tamper-free from trustworthy suppliers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ROT

A

Hardware root of trust: Used to scan the boot metrics and OS files to verify their signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TPM

A

Trusted Platform Module: Specification for hardware-based storage of certificates, keys, hashed passwords etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UEFI

A

Unified Extensible Firmware Interface: A type of firmware that provides support for 64-bit CPU operation at boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secure Boot

A

UEFI feature that prevents unwanted processes from executing
during the boot operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Measured Boot

A

UEFI feature that gathers secure metrics to validate the boot
process in an attestation report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attestation

A

claim that the data presented in the report is valid by digitally
signing it using the TPM’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

eFUSE

A

means for software or firmware to permanently alter the state
of a transistor on a computer chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Self encrypting drives

A

disk drive where the controller can automatically encrypt data
that is written to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure processing

A

A mechanism for ensuring the confidentiality, integrity, and availability of
software code and data as it is executed in volatile memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SME

A

Secure memory encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SEV

A

Secure encrypted virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TXT

A

Trusted execution technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SGX

A

Software guard extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bus encryption

A

Data is encrypted by an application prior to being placed on the data bus

17
Q

Atomic execution

A

Certain operations that should only be performed once or not at all

18
Q

Secure Encalve

A

Extensions allow a trusted process to create an encrypted container for sensitive data