• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/375

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

375 Cards in this Set

  • Front
  • Back
Information warfare
can be defined as any action to deny, exploit, corrupt, or destroy the enemy’s information and its function, while at the same timeprotecting one’s self against those same actions
Graphical user interface
(GUI)- front ends that only require a person to enter an
IP address or range, and click the start button
Two tiered architecture
includes a line of web servers that provide customers with a web based interface and a back-end line of servers or databases that hold
data and process the requests. Either the two tiers are within a DMZ or theback-end database is protected by another firewall
Structured query language
(SQL)- queries to remote resources using HTTP
Open database connectivity
(ODBC)- requests to the back-end database, and access secured, unpublished files
Top down approach
meaning that the initiation, support, and direction come from top management and work their way thorough middle management and then to staff members
Bottom up approach
refers to situation in which the IT department tries to develop a security program without getting proper management support and direction
Information owner
is usually a senior executive within the management group of
the company, or head of a specific department
AIC triad
availability, integrity, confidentiality
Availability
ensures reliability and timely access to data and resources to
authorized individuals
Integrity
is upheld when the assurance of accuracy and reliability of information
and systems is provided, and unauthorized modification is prevented
Confidentiality
ensures that the necessary level of secrecy is enforced at each
junction of data processing and prevents unauthorized disclosure
Shoulder surfing
is when a person looks over another person’s shoulder and watches their keystrokes or views data as it appears on a computer screen
Social engineering
is when one person tricks another person into sharing confidential information by posing as someone authorized to have access to that
information
Vulnerability
is a software, hardware, or procedural weakness that may provide an attacker the open door he is looking for to enter a computer or network and have unauthorized access to resources within the environment
Threat
is any potential danger to information or systems. The threat is that someone, or something, will identify a specific vulnerability and use it against the company or individual
Threat agent
a threat agent could be an intruder accessing the network through a
port of the firewall, a process accessing data in a way that violates the security policy, a tornado wiping out a facility, or an employee making an unintentional mistake that could expose confidential information or destroy a file’s integrity
Risk
is the likelihood of a threat agent taking advantage of a vulnerability and the corresponding business impact
Exposure
is an instance of being exposed to losses from a threat agent
Countermeasure
or safeguard, is put into place to mitigate the potential risk
Operational goals
a goal for yourself today or daily goals
Tactical goals
or midterm goals which take more time and effort
Strategic goals
look further into the future and are long term
Planning horizon
looking at operational goals, tactical, and strategic goals
Information risk management
(IRM)- is the process of identifying and assessing risk, reducing it to an acceptable level, and implementing the right mechanisms to maintain that level
Risk analysis
which is really a tool for risk management, is a method of identifying vulnerabilities and threats and assessing the possible damage to determine where to implement security safeguards
Cost/benefit comparison
compares the annualized cost of safeguards to the potential cost of loss
Loss potential
meaning what the company would lose if a threat agent were
actually to exploit a vulnerability
Delayed loss
has a negative effects on a company after a vulnerability is initially
exploited
Quantitative risk analysis
attempts to assign real and meaningful numbers to all elements of the risk analysis process. Quantitative analysis uses risk calculations that attempt to predict the level of monetary losses and the percentage of chance for each type of threat.
Single loss expectancy
(SLE)- is a dollar amount that is assigned to a single event that represents the company’s potential loss amount if a specific threat were to take place
Asset value x exposure factor
(EF) = SLE
Exposure factor
(EF)- represents the percentage of loss realized threat could have
on a certain asset
SLE x annualized rate of occurrence
(ARO) = ALE
Annualized rate of occurrence
(ARO)- is the value that represents the estimated frequency of a specific threat taking place within a one-year timeframe
Qualitative analysis
which does not assign numbers and monetary values to components and losses. Instead, qualitative methods walk through different scenarios of risk possibilities and rank the seriousness of the threats and the
validity of the different possible countermeasures
Uncertainty
refers to the degree to which you lack confidence in an estimate
Delphi technique
is a group decision method used to ensure that each member gives an honest opinion of what he or she thinks the result to a particular threat will be
Residual risk
no system or environment is 100 percent secure, which means there
is always some risk left over to deal with
Total risk
the risk a company faces if it chooses not to implement any type of
safeguard
Threats x vulnerability x asset value
= total risk
(Threats x vulnerability x asset value) x control gap
= residual risk
Transfer the risk
if a company decides that the total or residual risk is too high to
gamble with , it can purchase insurance
Reduces the risk
if the company implements countermeasures
Rejecting the risk
if a company is in denial about its risk or ignores it
Accept the risk
the company understands the level of risk it is faced with and the
potential cost of damage and decides to just live with it and not implement
countermeasure
Security policy
is an overall general statement produced by senior management
or a selected policy board or committee that dictates what role security plays within the organization
Organizational security policy
management establishes how a security program will be set up, lays out the program’s goals, assigns responsibilities, shows the
strategic and tactical value of security, and outlines how enforcement should be carried out
Issue specific policy
also called a functional implementing policy, addresses
specific security issues that management feels need more detailed explanation and attention to make sure a comprehensive structure is built and all employees
understand how they are to comply with these security issues
System specific policy
presents the management’s decisions that are specific to the actual computers, networks, applications, and data
Standards
refer to mandatory activities, actions, rules, or regulations. Standards
can give a policy its support and reinforcement in direction
Baseline
can refer to a point in time that is used as a comparison for future
changes. Once risks have been mitigated, and security put in place, a baseline is formally reviewed and agreed upon, after which all further comparisons and development are measured against it
Guidelines
are recommended actions and operational guides to users, IT staff,
operations staff, and others when a specific standard does not apply
Procedures
are detailed step by step tasks that should be performed to achieve a
certain goal
Due diligence
is the act of investigating and understanding the risks the company
faces
Due care
shows that a company has taken responsibility for the activities that
take place within the corporation and has taken the necessary steps to help protect the company
Data owner
information owner is usually a member of management, in charge of a specific business unit, and is ultimately responsible for the protection and use of a specific subset of information
Data custodian
information custodian is responsible for maintaining and
protecting the data. This role is usually filled by the IT department, and the duties include performing regular backups of the data, periodically validating the
integrity of the data, restoring data from backup media, retaining records of activity, and fulfilling the requirements specified in the company’s security policy, standards, and guidelines
System owner
is responsible for one or more systems, each of which may hold
and process data owned by different data owners
Security administrator’s
tasks include creating new system user accounts, implementing new security software, testing security patches and components, and issuing new passwords
Security analyst
helps to develop policies, standards, and guidelines and set various baselines
Application owner
usually the business unit managers, are responsible for dictating who can and cannot access their applications
Supervisor
also called user manager, is responsible for all user activity and any
assets created and owned by these users
Change control analyst
is responsible for approving or rejecting requests to make
changes to the network, systems, or software
Data analyst
is responsible for ensuring that data is stored in a way that makes
the most sense to the company and the individuals who need to access and work with it
Process owner
is responsible for properly defining, improving upon, and monitoring processes
Solution provider
this role is called upon when a business has a problem or requires that a process be improved upon
User
is any individual who routinely uses the data for work related tasks
Product line manager
evaluates different products in the market, works with vendors, understands different options a company can take, and advises management and business units on the proper solutions that are needed to meet their goals
Collusion
means that at least two people are working together to cause some typeof destruction or fraud, which drastically reduces the probability of destruction or fraud occurring
Nondisclosure agreements
need to be developed and signed by new employees to protect the company and its sensitive information
Rotation of duties
is an important control to keep each department a healthy and productive part of the company
Split knowledge and dual control
in both cases two or more individuals are authorized and required to perform a duty or task
Access controls
are security features that control how users and systems communicate and interact with other systems and resources
Subject
is an active entity that requests access to an object or the data within an object
Object
is a passive entity that contains information
Identification
describes a method of ensuring that a subject (user, program, or process) is the entity it claims to be
Race condition
is when two or more processes use the same resource and the sequences of steps within software can be carried out in improper order, which can drastically affect the output
Logical access controlS
are tools used for identification, authentication, authorization, and accountability
Cognitive password
is based on a user’s opinion or life experience. The password could be a mother’s maiden name, a favorite color, or dog’s name
Strong authentication
contains two out of these three methods: something a person knows, has, or is
Two factor authentication
for strong authentication to be in process, it must include two out of the three categories of knows, has, or is
Identity management
is a broad term that encompasses the use of different products to identify, authenticate, and authorize users through automated means
Biometrics
verifies an individual’s identity by analyzing a unique personal
attribute or behavior, which is one of the most effective and accurate methods of verifying identification
Type I error
false rejection rate
Type II error
false acceptance rate
Crossover error rate
(CER)- this rating is stated as a percentage and represents the
point at which the false rejection rate equals the false acceptance rate. CER is also called equal error rate (EER)
Minutiae
fingerprints are made up of ridge endings and bifurcations exhibited by
the friction ridges and other detailed characteristics
Hand geometry
the shape of a person’s hand defines hand geometry
Retina scan
a system that reads a person’s retina scans the blood vessel pattern of
the retina on the backside of the eyeball
Iris scan
the uniqueness of each of these characteristics within the iris is captured by a camera and compared with the information gathered during the enrollment
phase
Signature dynamics
signing a signature produces electrical signals that can be captured by a biometric system
Keyboard dynamics
captures electrical signals when a person types a certain
phrase
Voice print
a biometric system that is programmed to capture a voice print and compare it to the information captured in a reference file can differentiate one individual from another
Facial scan
a system that scans a person’s face attributes and are captured during a facial scan and compared to an earlier captured scan held within a reference record
Hand topography
looks at the different peaks and valleys of the hand, along with
its overall shape and curvature
Passwords
a password is a protected string of characters that is used to authenticate an individual. As stated previously, authentication factors are based on what a person knows, has, or is. A password is something the user knows
Cognitive passwords
are fact or opinion based information used to verify an individuals identity
One time password
also called a dynamic password. It is used for authentication
purposes and is only good once
Token device
or password generator, is usually a handheld device that has an LCD display and possibly a keypad
Synchronous token device
synchronizes with the authentication service by using
time or a counter as the core piece of the authentication process
Time based
the token device and the authentication service must hold the same time within their internal clocks
Counter synchronization
the user will need to initiate the logon sequence on the computer and push a button on the token device. This causes the token device and the authentication service to advance to the next authentication value. This value and a base secret are hashed and displayed to the user. The user enters this resulting value along with a user ID to be authenticated
Asynchronous token generating
method uses a challenge/response scheme to
authenticate the user
Digitally signing
a digital signature attached to a message proves that the
message originated from a specific source, and that the message itself was not changed while in transit
Passphrase
is a sequence of characters that is longer than a password and , in
some cases, takes the place of a password during the authentication process
Virtual password
making the passphrase the length and format that is required by
the application
Memory card
holds information but cannot process information
Smart card
holds information and has the necessary hardware and software to actually process that information
Contact smart card
has a gold seal on the face of the card
Contactless smart card
has an antenna wire that surrounds the perimeter of the card
Side channel attacks
are nonintrusive and are used to uncover sensitive information about how a component works without trying to compromise any
type of flaw or weakness
Electromagnetic analysis
examining the frequencies that are emitted
Microprobing
uses needles to remove the outer protective material on the card’s
circuits, by using ultrasonic vibration
Authorization creep
as employees work at a company over time and move from one department to another, they often are assigned more and more access rights and permissions
Need to know principle
it is based on the concept that individuals should be
given access only to information that they absolutely require to perform their job
duties
Single sign on
(SSO)- these capabilities would allow a user to enter credentials
one time and be able to access all resources in primary and secondary network domains
Kerberos
is an authentication protocol in a client/server model and is based on
symmetric key cryptography
Key distribution center
(KDC)- is the most important component within a Kerberos environment. The KDC holds all user’s and services secret keys
Principals
which can be users, applications, or network services
Secure European system for applications in a multi vendor environment
(SESAME)- SESAME uses symmetric and asymmetric cryptographic techniques to protect exchanges of data and to authenticate subjects to network resources
Privileged attribute certificates
(PACs)- which contain the subject’s identity, access capabilities for the object, access time period, and lifetime of the PAC
Privileged attribute server
(PAS)- holds a similar role to that of the KDC within kerberos
Security domain
just builds upon the definition of domain by adding the fact that
resources within this logical structure are working uder the same security policy and managed by the same group
Lightweight directory access protocol
(LDAP)- provide users access to network
resources transparently
Access control model
is a framework that dictates how subjects access objects. It
uses access control technologies and security mechanisms to enforce the rules and objectives of the model
Discretionary access control
(DAC)- enables the owner of the resource to specify which subjects can access specific resources
Mandatory access control
users and data owners do not have as much freedom to
determine who can access files
Role based access control
(RBAC)- also called nodiscretionary access control,
uses a centrally administrated set of controls to determine how subjects and objects interact. This type of model allows access to resources to be based on the role the user holds within the company
Rule based access control
uses specific rules that indicate what can and cannot happen between a subject and object it is based on the simple concept of if X then Y programming rules, which can be used to provided finer grained access control
to resources
Shell
is a type of virtual environment within a system; it is the user’s interface to the operating system and works as a command interpreter
Database views
are mechanisms used to restrict user access to data that is contained in databases
Access control matrix
is a table of subjects and objects indicating what actions individual subjects can take upon individual objects
Capability table
specifies the access rights a certain subject possesses pertaining to specific objects. A capability table is different from an ACL because the subject is bound to the capability table, whereas the object is bound to the ACL
Access control lists
(ACLs)- are used in several operating systems, applications,
and router configurations. They are lists of subjects that are authorized to access a specific object that they define what level of authorization is granted
Content dependent access control
access to objects is determined by the content within the object
Context dependent access control
differs from content dependent in that it makes access decisions based on the context of a collection of information rather than on the sensitivity of the data
Centralized access control administration
method is basically what it sounds like:one entity (department or individual) is responsible for overseeing access to all corporate resources
Remote authentication dial in user service
(RADIUS)- is a client/server
authentication protocol that authenticates and authorizes remote users. The access
server requests the remote user’s logon credentials and passes them back to a RADIUS server, which houses the user names and password values. The remote user is a client to the access server, and the access server is a client to the RADIUS server.
Terminal access controller access control system
(TACACS)- combines its
authentication and authorization processes, XTACACS separates authentication,
authorization, and auditing processes, and TACACS+ is XTACACS with extended two-factor user authentication. TACACS uses fixed passwords for the authentication and TACACS+ allows users to use dynamic one time passwords,
with provides more protection
TACACS+
provides the same functionality as RADIUS with a few differences in some of its characteristics. First TACACS+ uses TCP as its transport protocol, while RADIUS uses UDP. TACACS+ encrypts all of this data and thus does not
have the vulnerabilities that are inherent in the RADIUS protocol. TACACS+ uses a true AAA architecture, which separates the authentication, authorization,and accounting functionalities
Watchdog timers
are commonly used to detect software faults, such as a process
ending abnormally or hanging
Diameter
is a protocol that has been developed to build upon the functionality of RADIUS and overcome many of its limitations. Diameter is another AAA protocol that provides the same type of functionality as RADIUS and TACACS+ but also provides more flexibility and capabilities to meet the new demands of today’s complex and diverse networks
Mobile IP
technology allows a user to move from one network to another and
still use the same IP address
Roaming operations
(ROAMOPS)- allows PPP users to gain access to the internet
without the need of dialing into their home service provider
Decentralized access control administration
method gives control of access to the people closer to the resources. The people who may better understand who should and should not have access to certain files, data, and resources
Administrative controls
work at the top layer of a hierarchical access control
model
Security policy
is a high level plan that states managements intent pertaining to
how security should be practiced within an organization, what actions are acceptable, and what level of risk the company is willing to accept
Collusion
which means that more than one person would need to commit fraud, and their efforts would need to be concerted
Rotation of duties
means that people rotate jobs so that they know how to fulfill the obligations of more than one position
Control zone
is physical control. It is a specific area that surrounds and protects
network devices that emit electrical signals
Locks
are usually considered delay mechanisms because they only delay a determined intruder
Audit reduction tool
reduces the amount of information within an audit log
Variance detection tool
can monitor computer and resource usage trends and
detect variations
Attack signature detection tool
is used, the application will have a database of information that has been known to indicate specific attacks
Keystroke monitoring
is a type of auditing that can review and record keystrokes entered by a user during an active session
Scrubbing
deleting specific incriminating data within audit logs
Object reuse
issues pertain to reassigning to a subject media that previously
contained one or more objects. This means before someone uses a hard drive, floppy disk, or tape, it should be cleared of any residual information that was on it
previously
Tempest
started out as a study carried out by the DoD and then turned into a
standard that outlines how to develop countermeasures that control spurious electrical signals that are emitted by electrical equipment
Faraday cage
the devices (monitors, computers, printers etc) have an outer metal
coating
White noise
is a uniform spectrum of random electrical signals. A countermeasure used to combat intruders from extracting information electrical
transmissions is white noise
Intrusion detection systems
(IDSs)- is the process of detecting an unauthorized
use of, or attack upon, a computer, network, or telecommunications infrastructure. IDS’s are designed to aid in mitigating the damage that can be caused by hacking, or breaking into sensitive computer and network systems
Network based IDS
(NIDS)- monitor network communications. NIDS uses
sensors, which are either host computers with the necessary software installed or dedicated appliances, each with its network interface card NIC in promiscuous
mode
Host based IDS
(HIDS)- which can analyze the activity within a particular
computer system. Can be installed on individual workstations and/or servers and
watch for inappropriate or anomalous activity
Statistical anomaly based IDS
is a behavioral based system. Behavioral based IDS products do not use predefined signatures, but rather are put in a learning mode to build a profile of an environment’s normal activities
Protocol anomaly based filters
these types of IDSs have specific knowledge of each protocol that they will be monitoring. A protocol anomaly pertains to the format and behavior of a protocol
Traffic anomaly based IDS
most behavioral based IDSs have traffic anomaly filters, which detect changes in traffic patterns as in DoS attacks or a new service that appears on the network
Rule based IDS
takes a different approach than a signature based or statistical
based system. Rule based IDS is commonly associated with the use of an expert system. The knowledge of the system is written in rule based programming (if situtiation than action)
State based IDS
scans for attack signatures in the context of a stream of activity
instead of just looking at individual packets. It can only identify known attacks and requires updates of its signatures
Model based IDS
the product has several scenario models that represent how
specific attacks and intrusions take place. The models outline how the system would behave if it were under attack, the different steps that would be carried out
by the attacker, and the evidence that would be available for analysis if specific intrusions took place
Intrusion prevention system
(IPS)- the goal of an IPS is to detect this activity and not allow the traffic to gain access to the target in the first place. So an IPS is a preventative and proactive technology, whereas an IDS is a detective and after the fact technology
Honeypot
is a computer set up as a sacrificial lamb on the network. The system is not locked down and has open ports and services enabled. This is to entice a
would be attacker to this computer instead of attacking authentic production 21 systems on a network. The honeypot contains no real company information, and thus is not at risk
Network sniffer
is a general term for programs or devices that are able to examine traffic on a LAN segment
Brute force attacks
they are attacks that continually try different inputs to achieve
a predefined goal. Brute force is defined as trying every possible combination until the correct one is identified
Hybrid attack
which combines a dictionary attack and a brute force attack
Trusted path
is a communication link between the user and the kernel that cannot
be circumvented as described in the scenario of a fake logon screen
Security policy
is a statement that outlines how entities access each other, what
operations different entities can carry out, what level of protection is required for a system or software product, and what actions should be taken when these requirements are not met
Security model
outlines the requirements necessary to properly support and
implement a certain security policy
Computer architecture
encompasses all of the parts of a computer system that are
necessary for it to function, including the operating system, memory chips, logic circuits, storage devices, input and output devices, security components, buses,and networking components
Central processing units
(CPU)- is the brain of the computer. In the most general
description possible, it fetches instructions from memory and executes them
Arithmetic logic unit
(ALU)- the ALU performs mathematical functions and
logical operations on data
Control unit
manages and synchronizes the system while different applications
code and operating system instructions are being executed
General registers
are used to hold variables and temporary results as the ALU
works through its execution steps
Special registers
(dedicated registers) hold information such as the program
counter, stack pointer, and program status word (PSW)
Program counter register
contains the memory address of the next instruction that needs to be fetched
Stack
which is a memory segment that the process can read from and write to
Stack pointer
moves down to direct the CPU where the next piece of data is
located
Program status word
holds different condition bits
Address bus
which is a hard wired connection to the RAM chips in the system and the individual input/output (I/O) devices
Data bus
the address bus is used by the CPU to indicate the location of the instructions that need to be processed, and the memory or I/O device responds by sending the data that resides that the memory location through the data bus
Symmetric mode
that the processors are handed work as needed
Asymmetric mode
this usually means that the computer has some type of time
sensitive application that needs its own personal processor
Process
is a set of instructions actually running
Multi programming
means that more than one program or process can be loaded into memory at the same time
Cooperative multitasking
used in windows 3.1 and early macintosh systems, required the processes to voluntarily release resources that they were using
Preemptive multitasking
used in windows 9x, NT, 200, XP, and in Unix systems, the operating system controls how long a process can use a resource
Running state
CPU is executing its instructions and data
Ready state
waiting to send instructions to the CPU
Blocked state
waiting for input data, such as keystrokes from a user
Process table
which has one entry per process. The table contains each individual process’s state, stack pointer, memory allocation, program counter, and status of open files in use
Thread
is made up of an individual instruction set and the data that needs to be worked on by the CPU
Multiprogramming
an operating system can load more than one program in memory at one time
Multitasking
an operating system can handle requests from several different
processes loaded into memory at the same time
Multithreading
an application has the ability to run multiple threads simultaneously. An operating system can handle requests from several different threads at the same time
Multiprocessing
the computer has more than one CPU
Process isolation
is necessary to ensure that processes do not step on each other’s toes communicate in an insecure manner, or negatively affect each other’s productivity
Encapsulated
when a process is encapsulated, no other process understands or
interacts with its internal programming code
Time multiplexing
is a technology that allows processes to use the same
resources
Naming distinctions
just means that the different processes have their own name
or identification value
Virtual mapping
is different from physical mapping of memory. The physical memory is the RAM chips in the system. The operating system chops up this memory and assigns portions of it to the requesting processes. Once the process is assigned its own memory space, then it can address this portion however it needs to, which is called virtual mapping
Abstraction
means that the details of something are hidden
Dynamic link library
(DLL)- a set of functions that applications can call upon to
carry out different types of procedures
Base register
contains the beginning address that was assigned to the process
Limit register
contains the ending address
Random access memory
(RAM)- is a type of temporary storage facility where data and program instructions can temporarily be held and altered
Dynamic RAM
(DRAM)- the data being held in the RAM memory cells has to be
continually and dynamically refreshed, so that your bits do not magically disappear
Static RAM
(SRAM)- holds bits in its memory cells without the use of capacitors, but it does require more transistors than DRAM. SRAM is faster but more expensive
Thrashing
when a computer spends more time moving data from one small
portion of memory to another and actually processing the data
Read only memory
(ROM)- is a nonvolatile memory type, meaning that when a
computer’s power is turned off, the data is still held within the memory chips
Programmable read only memory
(PROM)- is a form of ROM that can be modified after it has been manufactured
Erasable and programmable read only memory
(EPROM)- can be erased,
modified, and upgraded
Electrically erasable programmable read only memory
(EEPROM)- is similar to EPROM, but its data storage can be erased and modified electrically by onboard programming circuitry and signals
Flash memory
is a special type of memory that is used in digital cameras, BIOS
chips, memory cards for laptops, and video game consoles. It is a solid state technology, meaning that it does not have moving parts and is used more as a type
of a hard drive than memory
Cache memory
is a type of memory that is used for high speed writing and
reading activities. When the system assumes that it will need to access specific information many times throughout its processing activities, it will sort the information in cache memory so that it is easily and quickly accessible
Absolute addresses
physical memory addresses that the CPU uses
Logical addresses
memory addresses that software uses
Relative addresses
are based on a known address with an offset value applied
Garbage collector
a garbage collector is software that runs an algorithm to identify unused committed memory and then tells the operating system to mark that memory as available
Secondary storage
is considered nonvolatile storage media and includes such things as the computer’s hard drive, floppy disks, or CD-ROMs
Swap space
is the reserved hard drive space that is used to extend RAM capabilities
Protection rings
the rings provide strict boundaries and definitions for what the processes that work within each ring can access and what operations they can
successfully execute
Monolithic operating system architecture
is commonly referred to as the big
mess because of its lack of structure. The operating system is mainly made up ofvarious procedures that can call upon each other in a haphazard manner
Layered operating system
architecture separates system functionality into hierarchical layers
Data hiding
which means that instructions and data at the various layers do not have direct access to the instructions and data at any other layers
Microkernel
learner kernel in a client/server model
Subsystems
the server processes can be file system server, memory server, I/O server, or process server. These servers are commonly called subsystems
Domain
is defined as a set of objects that a subject is able to access. This domain can be all the resources a user can access, all the files available to a program, the memory segments available to a process, or the services and processes available to an application
Execution domain
a process that resides in a privileged domain needs to be able to execute its instructions and process its data with the assurance that programs in a different domain cannot negatively affect its environment
Virtual machines
is a simulated environment
Java virtual machine
(JVM)- creates virtual machines called sandboxes in which
java applets run
Trusting computing base
(TCB)- the TCB is defined as the total combination of protection mechanisms within a computer system. The TCB includes hardware,software, and firmware. These are part of the TCB because the system is sure that these components will enforce the security policy and not violate it
Trusted shell
means that someone who is working in that shell cannot bust out of it and other processes cannot bust into it
Process activation
deals with the activities that have to take place when a process is going to have its instructions and data processed by the CPU
Execution domain switching
takes place when a process needs to call upon a process in a higher protection ring
Security perimeter
is a boundary that divides the trusted from the untrusted
Reference monitor
is an abstract machine that mediates all access subjects have to objects, both to ensure that the subjects have the necessary access rights and to protect the objects from unauthorized access and destructive modification
Security kernel
is made up of hardware, software, and firmware components that fall within the TCB and implements and enforces the reference monitor concept
Multilevel security policies
these types of policies permit a subject to access an object only if the subject’s security level is higher than or equal to the object’s classification
Least privilege
only processes that need to carry out critical system functions
should be allowed to, and other, less privileged processes should call upon the more privileged processes to carry out these types of activities when necessary
State machine models
all current permissions and all current instances of subjects
accessing objects must be captured. Maintaining the state of a system deals with each subjects association with objects
Bell LaPadula model
it was the first mathematical model of a multilevel security
policy used to define the concept of a secure state machine and modes of access
and outlined rules of access. The model’s main goal is to prevent secret information from being accessed in an unauthorized manner. It is a subject to object model
Simple security rule
states that a subject at a given security level cannot read data
that resides at a higher security level
* property
states that a subject in a given security level cannot write information to a lower security level
Strong star property rule
states that a subject that has read and write capabilities
can only perform those functions at the same security level, nothing higher and nothing lower
Multilevel security system
users with different clearances use the system, and the system processes data with different classifications
Basic security theorem
which states that if a system initializes in a secure state
and all allowed state transitions are secure, then every subsequent state will be secure no matter what inputs occur
Tranquility principle
means that subjects and objects cannot change their security
levels once they have been instantiated
Biba model
it is a state machine model and is very similar to the Bell lapadula
model. Biba addresses the integrity of data within applications
Well formed transaction
using TPs to modify CDI’s
Information flow model
can deal with any kind of information flow, not only from one security level to another. In the information flow model, data is though of as being held in individual and discreet compartments. The model ensures that information cannot flow from one compartment to another in a way that threatens the confidentiality of the data
Covert channel
is a way for an entity to receive information in an unauthorized
manner
Convert timing channel
one process relays information to another by modulating its use of system resources. The modulation of system resources may entail accessing the hard drive or using excessive CPU cycles
Covert storage channel
one process writes data to a storage location and another
process directly, or indirectly, reads it. The problem occurs when the processes are at different security levels and therefore are not supposed to be sharing sensitive data
Noninterference
this concept is implemented to ensure that any actions that take
place at a higher security level do not affect, or interfere with, actions that take place at a lower level
Inference attack
occurs when someone has access to some type of information and can infer or guess something that he does not have the clearance level or
authority to know
Lattice model
a structure consisting of a finite partially ordered set together with
least upper and greatest lower bound operators on the set
Brewer and Nash model-
also called the Chinese wall model, was created to provide access controls that can change dynamically depending upon a user’s 29 previous actions. The main goal of the model is to protect against conflicts of interest by users access attempts
Security evaluation
examines the security-relevant parts of a system, meaning the
TCB, access control mechanisms, reference monitor, kernel, and protection mechanisms
Trusted computer system evaluation criteria
(TCSEC) (Orange Book)- is used to evaluate operating systems, applications, and different products. The orange book is used to evaluate whether the product is appropriate for a specific application orfunction
Trusted network interpretation
(TNI)- also called the red book addresses security evaluation topics for networks and network components. It addresses isolated local area networks and wide area internetwork systems
Information technoloty evaluation criteria
(ITSEC)- there are two main attributes of a systems protection mechanisms when they are evaluated under ITSEC:
functionality and assurance
Common criteria
an evaluation is carried out on a product and is assigned an
evaluation assurance level (EAL). The common criteria has seven assurance levels
Protection profiles
this is a mechanism that is used to describe a real-world need
of a product that is not currently on the market
Certification
is the comprehensive technical evaluation of the security components and their compliance for the purpose of accreditation
Accreditation
is the formal acceptance of the adequacy of a system’s overall
security and functionality by management
Open systems
are built upon standards, protocols, and interfaces that have published specification, which enable third party vendors to develop add on components and devices
Closed systems
use an architecture that does not follow industry standards.
Interoperability and standard interfaces are not employed, to enable easy communication between different types of systems and add on features
Maintenance hooks
are a type of backdoor. They are instructions within software that only the developer knows about and can invoke
Time of check/time of use attack
(TOC/TOU)- deals with the sequence of steps that a system uses to complete a task. This type of attack takes advantage of the dependency on the timing of events that take place in a multitasking operating system. This type of attack is also referred to as a asynchronous attack
Race condition
is when two different processes need to carry out their tasks on
one resource
Buffer overflow
takes place when too much data is accepted as input to an
application or operating system. A buffer is an allocated segment of memory. A buffer can be overflowed arbitrarily with too much data, but for it to be an any use to an attacker, the code that is inserted into the buffer must be of a specific length followed up by commands the attacker wants to be executed
Bounds checking
to ensure that the inputted data is of an acceptable length
Physical security
concerned with how people can physically enter an environment and cause an array of damages
Life safety
looking at how to protect human life above all else
Layered defense model
which means that physical controls should work together
in a tiered architecture
Crime prevention through environmental design
(CPTED)- is a discipline that
outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior
Target hardening
focuses on denying access through physical and artificial
barriers (alarms, locks, fences, and so on)
Natural access control
is the guidance of people entering and leaving a space by the placement of doors, fences, lighting, and even landscaping
Security zones
an environments space should be divided into zones with different security levels, depending upon who needs to be in that zone and the associated risk
Natural surveillance
is to make criminals feel uncomfortable, by providing many ways that observers could potentially see them, and make all other people feel safe and comfortable, by providing an open and well designed environment
Territorial reinforcement
which creates physical designs that emphasize or extend the company’s physical sphere of influence so that legitimate users feel a sense of ownership of that space
Facility safety officer
whose main job is to understand all the components that make up the facility and what the company needs to do to protect its assets and stay within compliance
Light frame construction material
provides the least amount of protection against fire and forcible entry attempts
Heavy timber construction material
is commonly used for office buildings
Incombustible material
such as steel, which provides a higher level of fire protection than the previously mentioned materials but loses its strength under extreme temperatures
Fire resistant material
the construction material is fire retardant and has steel rods
encased inside of concrete walls and support beams
Mantrap
is a small room with two doors
Fail secure
configuration means that the doors default to being locked if there are
any problems with the power
Standard glass
windows are commonly used in residential home and are easily
broken
Tempered glass
is made by heating the glass and then suddenly cooling it. This
increases its mechanical strength, which means that it can handle more stress and is harder to break
Acrylic glass
can be made out of polycarbonate acrylic, which is stronger than standard glass but produces toxic fumes if burned. It is resistant to a wide range of threats fire chemical breakage but it is more expensive
Embedded wires
there are actually two sheets of glass, with the wiring in between. The wires help reduce the likelihood of the window being broken or shattering
Laminated glass
has two sheets of glass with a plastic film in between them
Solar window film
provides extra security by being tinted and extra strength through the film’s material
Security film
transparent film is applied to the glass to increase its strength
Internal partitions
are used to create barriers between one area and another. These partitions can be used to segment separate work areas, but should never be used in protected areas that house sensitive systems and devices
Passive relocking function
is when a safe can detect when someone attempts to tamper with the safe, in which case extra internal bolts will fall into place to ensure that it cannot be compromised
Thermal relocking function
is when a safe when a certain temperature is met possibly from drilling, an extra lock is implemented to ensure that the valuables are properly protected
Online UPS systems
use AC line voltage to charge a bank of batteries
Standby UPS
devices stay inactive until a power line fails
Electromagnetic interference
(EMI)- can be created by the difference between three wires: hot, neutral, and ground , and the magnetic field that they create
Radio frequency interference
(RFI)- can be caused by anything that creates radio waves. Fluorescent lighting is one of the main causes of RFI
Positive drains
their contents flow out instead of in
Hygrometer
usually used to monitor humidity
Fire prevention
includes training employees on how to react properly when faced
with a fire, supplying the right equipment and ensuring that it is in working order, making sure there is an easily reachable fire suppression supply, and storing
combustible elements in the proper manner
Fire suppression
is the use of a suppression agent to put out a fire
Photoelectric device
also referred to as an optical detector, detects the variation
in light intensity. The detector produces a beam of light across a protected area, and if the beam is obstructed, the alarm sounds
Plunum areas
the space above drop down ceilings, the space in wall cavities, and the space under raised floors for wiring and cables
Halon
is a gas that was widely used in the past to suppress fires because it interferes with the chemical combustion of the elements within a fire. It is now federally restricted because it is harmful to the ozone
Water pipe systems
always contain water in the pipes and are usually discharged by temperature control level sensors
Dry pipe systems
the water is not actually held in the pipes. The water is contained in a holding tank until it is released
Preaction systems
are similar to dry pipe systems in that the water is not held in the pipes but is released when the pressurized air within the pipes is reduced
Deluge system
has its sprinkler heads wide open to allow a larger volume of water to be released in a shorter period
Warded lock
is the basic padlock
Pin tumbler lock
is the most commonly used tumbler lock. The key has to have
just the right grooves to put all the spring loaded pins in the right position so that the lock can be locked or unlocked
Wager tumbler
also called disc tumbler locks are small, round locks that you usually see on file cabinets
Combination locks
require the correct combination of numbers to unlock them. These locks have internal wheels that have to line up properly before being unlocked
Cipher locks
also known as programmable locks, are keyless and use keypads to control access into an area or facility. The lock requires a specific combination to be entered into the keypad and possibly a swipe card
Tension wrench
is a tool that is shaped like an L and is used to apply tension to the internal cylinder of a lock
Raking
circumvent a pin tumbler lock, a lock pick is pushed to the back of the
lock and quickly slid out while providing upward pressure
System sensing access control readers
also called proximity devices or
transponders, recognize the presence of an approaching object within a specific area
Electronic access control tokens
(EAC)-is a generic term that is used to describe proximity authentication devices, which can be proximity readers,programmable locks, or biometric systems, which identify and authenticate users before allowing them entrance into physically controlled areas
Perimeter intrusion detection and assessment system
(PIDAS)- is a type of fencing that has sensors on the wire mesh and at the base of the fence
Bollards
usually look like small concrete pillars outside a building
Glare protection
lighting should be pointed at gates or exterior access points, and the guard locations should be more in the shadows, or under a lower amount of illumination
Continuous lighting
an array of lights that provides an even amount of illumination across an area
Responsive area illumination
takes place when an IDS detects suspicious activities and turns on the lights within a specific area
Closed circuit TV
(CCTV)- is a commonly used monitoring device in most organizations. CCTV's are made up of cameras, transmitters, receivers, a recording system, and a monitor
Charged coupled devices
(CCDs)- is an electrical circuit that receives input light from the lens and converts it into an electronic signal, which is then displayed on the monitor
Focal length
of a lens describes its effectiveness in viewing objects from a horizontal and vertical view
Depth of field
refers to the portion of the environment that is in focus when shown on the monitor
Manual iris lenses
have a ring around the CCTV lens that can be manually turned
and controlled
Fixed mounting
or a mounting that allows the camera to move when necessary
PTZ capabilities
can pan, tilt, or zoom as necessary
Electro mechanical systems
work by detecting a change or break in a circuit
Photoelectric system
detects the change in a light beam and thus can be used only in windowless rooms
Passive infrared system
(PIR)- identifies the changes of heat waves in an area it is configured to monitor
Acoustical detection system
uses microphones that are installed on floors, walls, or ceilings
Vibration sensors
are implemented to detect forced entry
Wave pattern motion detectors
range in the frequency of waves that they monitor
Proximity detector
also called a capacitance detector, emits a measurable magnetic field. The detector monitors this magnetic field, and an alarm sounds if the field is disrupted
Telecommunications
is the electrical transmission of data among systems, whether through analog, digital, or wireless transmission types
Protocol
is a standard set of rules that determines how systems will communicate across networks
Open network architecture
is one that no vendor owns, that is not proprietary,and that can easily integrate various technologies and vendor implementations of those technologies
Encapsulation
a message is constructed within a program on one computer and
passed down through the protocols stack. A protocol at each layer adds its own information to the message. The message is then sent to the destination computer,
and the encapsulation is reversed by taking the packet apart through the same steps used by the source computer that encapsulated it
Application layer
layer 7, works closest to the user and provides file transmissions, message exchanges, terminal sessions, and much more
Presentation layer
layer 6, receives information from the application layer protocols and puts it in a format that all computers following the OSI model can understand
Session layer
layer 5, is responsible for establishing a connection between the two applications, maintaining it during the transfer of data, and controlling the
release of this connection
Transport later
layer 4.when two computers are going to communicate through a
connection-oriented protocol, they will first agree on how much information each computer will send at a time, how to verify the integrity of the data once it is
received, and how to determine whether a packet was lost along the way. The two computers agree on these parameters through a handshaking process at the transport layer
Network layer
layer 3, main responsibilities of the network layer are to insert information into the packets header so that it can be properly addressed and routed, and then to actually route the packets to their proper destination
Data link layer
layer 2, is where the network stack knows what format the data frame must be in to transmit properly over token ring, Ethernet, ATM, or fiber
distributed data interface (FDDI) networks
Physical Layer
layer 1, converts bits into voltage for transmission
TCP/IP
is a suite of protocols that governs the way that data travels from one device to another
IP
is a connectionless protocol that provides the addressing and routing
capabilities for each package of data. It is the mechanism that enables the network to read IP addresses and implement proper routing functions
TCP
is a reliable and connection oriented protocol, which means that it ensures
that packets are delivered to the destination computer
UDP
is a best effort and connectionless protocol. It has neither packet
sequencing nor flow and congestion control, and the destination does not
acknowledge every packet it receives
Socket
when a TCP or UDP message is formed, a source and destination port are contained within the header information along with the source and destination addresses, this makes up a socket
Message
when an application formats data to be transmitted over the network the
data is called a message
Segment
when the message is sent to the transport layer, where TCP does its
magic on the data that bundle of data is now a segment
Datagram
the network layer adds routing and addressing, and now the bundle is
called a datagram
Frame
the network layer passes off the datagram to the data link layer which
frames the datagram with a header and a trailer, and now it si called a frame
Analog transmission signals
are continuously varying electromagnetic waves that
can be carried over air, water, twisted-pair cable, coaxial cable, or fiber-optic cable
Modulation
data is combined with a carrier signal of a specific frequency
Amplitude
height of a signal
Frequency
number of waves in a defined period of time