Vulns, Threats, CounterMeasures Flashcards

1
Q

Processor

A

CPU. Governs all major operators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multi-tasking

A

Processor Execution Type. Handling 2+ tasks simultaneously, more simulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Multi-processing

A

System with more than one processor (CPU) to complete the execution of a single application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Processor Execution Types

A

Multi-tasking
Multi-processing
Multi-threading
Multi-programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SMP / MPP

A

Multi-processing
Symmetric multiprocessing: single computer with multiple processors treated equally, controlled by single OS

Massively parallel processing: tons of processors, each with dedicated resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multi-programming

A

Similar to multi-tasking. OS coordinates pseudosimultaneous execution of two tasks on a single processor

Batch/serialize multiple processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multi-threading

A

Multiple concurrent tasks to be performed within a single process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Single State/Multi State (processing types)

A

Single: a processor/system only handles one level of security/data. Policy.

Multi-state: can handle multiple levels of security by leveraging protection mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protection Rings

A

L0: OS Kernel/Memory
L1: OS components
L2: Drivers, protocols, etc.
L3: User / programs, application (user mode)

mediated access model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Process States

A
Ready
Waiting
Running
Supervisory
Stopped
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Modes

A

Dedicated
System High
Compartmented
Multilevel

Valid Sec Clearance
Access approval for all info processed by system
Valid NTK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Operating Modes

A

User Mode

System Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Read-only memory

A

ROM. Can’t be altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PROM

A

Programmable ROM. User can burn in contents later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EPROM

A

erasable PROM. EEPROM, UVEPOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flash memory

A

Derivative of EEPROM. NAND flash, used in memory cards, thumb drives, mobile devices, SSDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RAM

A

Random access memory. Readable/writeable memory that CPU uses during processing.

Only exists when power on. Temp storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Real memory

A

Main/primary memory. Largest RAM storage on computer. Dynamic RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cache RAM

A

Taking data from slower devices and temporarily loading it in faster devices for high repeat use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dynamic vs static ram

A

Dynamic: capacitors. CPU must spend time refreshing contents to ensure integrity.

Static: flip-flop. More costly, much faster.

21
Q

Registers

A

Onboard memory on CPU, directly accessible data to ALU (arithmetic logical unit)

22
Q

Register Addressing

A

“Register 1”

23
Q

Immediate addressing

A

“Add 2 to register 1”

24
Q

Direct addressing

A

CPU is given actual address of memory location

25
Q

Indirect addressing

A

Memory address points to intermediate memory address of actual locatino

26
Q

Memory Addressing

A
Register
Immediate
Direct
Indirect
BaseOffset
27
Q

Secondary Memory

A

Magnetic, optical, flash-based media/other that contain data not available to CPU.

Much cheaper.

28
Q

Virtual Memory

A

type of secondary memory.

Pagefile is most common. Paging - brings data from disk back into real memory

29
Q

Memory security issues

A

Proper erasure
Theft
Freezing
Access data stored in memory while in use

30
Q

Primary vs secondary storage

A

Primary storage = primary memory == RAM.

Secondary storage = secondary memory = .. all

31
Q

Volatile vs non-volatile

A

How likely it is to lose data when power is off

32
Q

Random vs sequential

A

Random: can access any data wherever whenever.

33
Q

Storage Media security

A

Data Remanence
SSD sanitization
Theft
Access to data

34
Q

Phreaking

A

Van eck phreaking - TEMPEST. Getting monitor data from afar

35
Q

Modems

A

Suck. remove them.

36
Q

Memory-mapped I/O

A

Indirect mapping between CPU addresses and actual address.

37
Q

Interrupt IRQ

A

Device sends signal on assigned IRQ. OS must control access to IRQs

38
Q

Direct memory access

A

DMA, DACK. OS brokers once, CPU gets out of way. Devices exchange data with real memory directly.

39
Q

Firmware

A

software stored on ROM chip.

40
Q

BIOS

A

Basic input/output system. Independent instructinos that a computers needs to start up and load the OS from disk.

41
Q

BIOS

A

Basic input/output system. Independent instructinos that a computers needs to start up and load the OS from disk.

42
Q

phlashing

A

malicious code embedding itself into BIOS/firmware.

43
Q

Applets

A

Mini programs sent from server to a client. But expose client to remote-send code to be executed

Java
ActiveX

44
Q

Local Cache issues

A
ARP Poisoning
DNS cache poisoning
HOSTS file
Authorizing DNS attacks
Cache DNS server attacks
DNS query spoofing
Temporary internet files
45
Q

Database security

A
Aggregation
Inference
Data Mining
Data Warehousing
Data Analytics
46
Q

Mobile Device Security

A

Device security: encryption, remote wiping, lockout, screen locks, GPS, app control, storage segmentation, asset tracking, inventory control, MDM, device access control, removable storage, disabling unused features

47
Q

App Sec

A

Key mgmt, Cred mgmt, Auth, geotagging, encryption, app whitelisting

48
Q

BYOD concerns

A

data ownership, support ownership, patch mgmt, av mgmt, forensics, privacy, on/off boarding, adherence to corporate policies, user acceptance, legal concerns, camera/videos