Week 9: Physical and environmental security Flashcards

1
Q

Give an example of a compromising emanation involving unintentional signals.

A

Unintentional signals that, if intercepted and analysed, would disclose the information transmitted, received, handled, or otherwise processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Emission Security?

A

Preventing attacks using compromising emanations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are side-channel attacks?

A

attacks that exploit stray optical, thermal and acoustic emanations from various kinds of equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two types of side-channel attacks?

A

Passive and active attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a passive side-channel attack?

A

: The opponent makes use of electromagnetic signals. E.g.:
leakage through power and signal cables,
leakage through radio frequency (RF) signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an active side-channel attack?

A

The compromising emanations are hostilely induced or provoked. E.g.:
Tempest viruses,
“Nonstop”
“Glitching” and Differential Fault Analysis (in smartcards)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Black Equipment

A

A term applied to equipment that processes only unclassified and/or encrypted information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is black line?

A

An optical fibre or a metallic wire that carries a black signal or that originates/terminates in a black equipment or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Red Equipment?

A

A term applied to equipment that processes unencrypted information (NSI) that requires protection during electrical/electronic processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHat is Red Line?

A

An optical fibre or a metallic wire that carries a red signal or that originates/terminates in a red equipment or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a red-side processor?

A

responsible for cryptographic functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a black side processor?

A

responsible for communication stacks and drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

There is an NSA specification and NATO certification for protecting equipment, why arent they revealed

A

Classified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In 1981, what did NATO agree on?

A

agreed on a scheme to have vendors offer approved TEMPEST products for sale to NATO countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the NSA specification factors include?

A

distance, shielding, filtering and masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is inspectable space?

A

The space surrounding equipment that processes classified or sensitive information within which exploitation is not practical or legal authority to identify and/or remove a potential exploitation exists.

17
Q

What is Uncontrolled Access Area?

A

The space in and around a building where no personnel access controls are exercised.

18
Q

What is TEMPEST Certified Equipment or System?

A

Equipment or systems that have complied with the US requirements of NSTISSAM TEMPEST/1-92 Level I or previous editions.

19
Q

What is a recommendation from tempest?

A

50cm between red processor and black
wires
equipment
power lines

20
Q

What is a method of cable protection?

A

Optical fibre does not emit electromagnetic energy.
Eavesdropping would require physical access to the fibre (difficult to occur undetected)

Cables can be manufactured in an intruder-resistant interlock armor, using steel or aluminium spiral wraps with UV-resistant sheath.

Secure connectors can help mixed-use facilities to keep systems separate

In the case of copper, crosstalk can be further minimised with a foil shield.

21
Q

What is Stingray?

A

Stingray is an example of an active attack, in which a fake base station tricks nearby phones to authenticate with them instead of a real base station (for which the signal would be weaker)