Test deck2 Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISO 15288:2015

A

systems engineering standard covering processes and life cycle stages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISO 15288:2015 processes that are divide into four categories

A
  1. Agreement 2. Organization project-enabling 3. Technical Management 4. Technical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The left side of the V (V-Model) represents

A

concept development and the decomposition of requirements into functions and physical entities that can be architected, designed, and developed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The right side of the V represents

A

integegration of these entities and their ultimate transition into the field, where they are operated and maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Defense in Depth

A

The use of overlapping layers of controls/countermeasures to create a series of defensive layers of physical, administrative, technical types to secure assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Common Criteria (ISO 15408)

A

Provides a structure methodology for documenting security requirements, documenting and validating security capabilities, and promoting international cooperation in the are of IT security. Use of the common criteria “protection profiles” and “security targets” greatly aids in the development of products and systems that have IT security functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ISO/IEC 21827:2008

A

System Security Engineering - capability Maturity Model (SSE-CMM), describes the essential characteristics of an organization’s security engineering process that must exist to ensure good security engineering. It does NOT prescribe a particular process or sequence, but captures practices generally observed in industry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ISO 21827 covers the following standard security metric for security engineering practices

A
  1. The entire life cycle, including development, operation, maintenance, and decommission activities. (DOM, D) 2. The whole organization, including management, organizational, and engineering activities. 3. Concurrent interactions with other disciplines, such as system, software, hardware, human factors, test engineering, system management, operation, and maintenance. 4. Interactions with other organizations, including acquisition, system management, certification, accreditation, and evaluation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Subjects Objects

A

Users Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Closed Open Systems

A

Vendor Specific Industry Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confinement (sandboxing)

A

Ability to control read/write activity as software executes in a system and accesses memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bounds

A

limits set on the memory addresses and resources a process can access in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Isolation

A

the ability to use bounds and confinement to control the impact process behavior has on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Controls (in the context of access)

A

use of access rules to limit subject / object interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trusted System

A

one where all protection mechanisms work together to process sensitive data for many types of users while maintaining a stable, secure environment

17
Q

Assurance

A

the degree of confidence or certainty in a system’s ability to satisfy the defined security requirements

18
Q

Security Model

A

provides a way for the designer(s) of a system to correlate abstract statements into a security policy that will define an explicit set of rules allowing a computer to implement the fundamental concepts of the policy.