• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/47

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

47 Cards in this Set

  • Front
  • Back
System Architecture
-formal tool to design comp. systems in a manner that ensures the stakeholders' concerns are addressed
-Different views, represented by system components and relationships
-functionality, performance, interoperability, security
ISO/IEC 42010:2007
-How system arch. frameworks and their description languages are to be used
CPU control unit
-timing of the execution of instructions and data
ALU
performs mathematical functions and logical operations
Memory managers, protection mechanisms
-base(beginning) and limit(ending) addressing
-Address space layout randomization
-data execution prevention
OS addressing memory schemes
-Absolute(hardware)
-logical(indexed)
-relative(indexed addresses, including offsets)
Buffer overflow vulnerabilities
Counter: bounds checking
Garbage collector
software tool that releases unused memory segments to help prevent "memory starvation"
Processor families
Work within different microarchitectures to execute specific instruction sets
Monolithic OS
-old
-all code in kernel mode layer
-components communicated in ad hoc manner
OS architectures
-monolithic
-microkernel
-hybrid kernel
Mode transition
-user to kernel mode
Ringed Architecture
-lower rings = more trusted
-vice versa
OS processes
-executed in privileged or supervisor mode
-applications user mode "problem state"
Virtual storage(swap, paging)
-Combines RAM and secondary storage, so the system seems to have a larger bank of memory
Security mechanisms
-more complex=less assurance
TCB
collection of system components that enforce the security policy directly and protect the system
-Within the security perimeter
-hardware, software, firmware
Security perimeter
-imaginary boundary
-trusted inside, untrusted outside
Reference monitor
-abstract machine
-Ensures subjects have Access rights b4 accessing objects
-mediates access
Security Kernel
-isolate processes carrying out the reference monitor concept
-tamperproof
-invoked on each access attempt
-small enough to be properly tested
Process isolation
-through segmented memory addressing
-encapsulation of objects
-time multiplexing of shared resources
-naming distinctions
-virtual mapping
-multiple processes can run concurrently and the processes will not interfere with each other or affect each others memory segments.
Level of security
How well it enforces security policy
Multi-level security system
-processes data at different classifications
-users w/ different security levels can use the system
Data hiding
-Processes work at differing security levels
-communicate only through secure APIs
-Encapsulation
Security Model
-maps abstract goals fo a security policy to computer system terms and concepts
-Gives security policy structure and provides a framework for systems
Closed system
-proprietary
open system
-interoperability
Bell-LaPadula
-Confidentiality
-simple security rule = no read up
-*-property rule = no write down
-strong * property rule = R/W at same security level
-Gov./military
Biba
-integrity
-No write up
-No read down
-Commercial sector
-only 1 integrity goal: prevent unauth'd users from making mods.
Clark-Wilson
-integrity
-Commercial sector
-Access only through applications
-provisions for separations of duties and requires auditing tasks in software
-all 3 integrity goals: unauth'd users from making mods; prevent authorized users from improper mods; maintain internal and external consistency
State-machine model
-Different states a system can enter
-Start in secure state
-if shutdown and fails securely, will never end up in an insecure state
Lattice model
upper bound and lower bound of authroized access for subjects
Info Flow security model
-does not permit data to flow to an object in an insecure manner
Dedicated Security mode
-1 level of data classification
-All users must have this clearance level
Trust
-system uses all of its protection mechanisms properly to proce3ss sensitive data for many types of users.
-Assurance level of this trust
Orange Book/ TCSEC
-evaluate systems built mainly for govennment
-Standalone systems
-Rating= combination of Functionality/Assurance
Rainbow Series
-Evaluate networking and other security bases
ITSEC
-Assurance/functionality of a systems protection mechanisms separately
Common Criteria
-globally recognized
-combines TCSEC, ITSEC, CTCPEC, and Federal Criteria
-protection profiles, security targets, and ratings(EAL1 to EAL7)
-provide assurance ratings for TOE(targets of evaluation)
-based off of ISO/IEC15408
Certification
-Technical eval of a system/product and its components
Accreditation
-Mgmts formal approval and acceptance of the system provided by a system
ISO/IEC15408
Basis for eval of security properties of products under CC
Covert channel
-unintended communication path
-transfers data in a way that violates security policy
Covert timing channel
enables a process to relay info to another process by modulating its use of system resources
Covert storage channel
enables a process to write data to storage so another process can read it
Maintenance Hook
developed by programmer into app for quick maintenance
-bypasses normal AC
-should be removed b4 production
TOC/TOU
time of check/time of use
-asynchronous attacks