Shared Flashcard Set

Details

Domain 6 - Security Architecture and Design
CISSP - Domain 6 - Security Architecture and Design Terms from AIO v6
87
Computer Networking
Professional
11/25/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
ISO/IEC 42010:2007
Definition
International standard that provides guidelines on how to create and maintain system architectures.
Term
central processing unit (CPU)
Definition
A silicon component made up of integrated chips with millions of transistors that carry out the execution of instructions within a computer.
Term
arithmetic logic unit (ALU)
Definition
Component of the CPU that carries out logic and mathematical functions as they are laid out in the programming code being processed by the CPU.
Term
Control unit
Definition
Part of the CPU that oversees the collection of instructions and data from memory and how they are passed to the processing components of the CPU.
Term
Register
Definition
Small, temporary memory storage units integrated and used by the CPU during its processing functions.
Term
General registers
Definition
Temporary memory location the CPU uses during its processes of executing instructions. The ALU’s “scratch pad” it uses while carrying out logic and math functions.
Term
Special registers
Definition
Temporary memory location that holds critical processing parameters. They hold values as in the program counter, stack pointer, and program status word.
Term
Program counter
Definition
Holds the memory address for the following instructions the CPU needs to act upon.
Term
Stack
Definition
Memory segment used by processes to communicate instructions and data to each other.
Term
Program status word
Definition
Condition variable that indicates to the CPU what mode (kernel or user) instructions need to be carried out in.
Term
User mode (problem state)
Definition
Protection mode that a CPU works within when carrying out less trusted process instructions.
Term
Kernel mode (supervisory state, privilege mode)
Definition
Mode that a CPU works within when carrying out more trusted process instructions. The process has access to more computer resources when working in kernel versus user mode.
Term
Address bus
Definition
Physical connections between processing components and memory segments used to communicate the physical memory addresses being used during processing procedures.
Term
Data bus
Definition
Physical connections between processing components and memory segments used to transmit data being used during processing procedures.
Term
Symmetric mode multiprocessing
Definition
When a computer has two or more CPUs and each CPU is being used in a load-balancing method.
Term
Asymmetric mode multiprocessing
Definition
When a computer has two or more CPUs and one CPU is dedicated to a specific program while the other CPUs carry out general processing procedures.
Term
Process
Definition
Program loaded in memory within an operating system.
Term
Multiprogramming
Definition
Interleaved execution of more than one program (process) or task by a single operating system.
Term
Multitasking
Definition
Simultaneous execution of more than one program (process) or task by a single operating system.
Term
Cooperative multitasking
Definition
Multitasking scheduling scheme used by older operating systems to allow for computer resource time slicing. Processes had too much control over resources, which would allow for the programs or systems to “hang.”
Term
Preemptive multitasking
Definition
Multitasking scheduling scheme used by operating systems to allow for computer resource time slicing. Used in newer, more stable operating systems.
Term
Process states (ready, running, blocked)
Definition
Processes can be in various activity levels. Ready = waiting for input. Running = instructions being executed by CPU. Blocked = process is “suspended.”
Term
Interrupts
Definition
Values assigned to computer components (hardware and software) to allow for efficient computer resource time slicing.
Term
Maskable interrupt
Definition
Interrupt value assigned to a noncritical operating system activity.
Term
Nonmaskable interrupt
Definition
Interrupt value assigned to a critical operating system activity.
Term
Thread
Definition
Instruction set generated by a process when it has a specific activity that needs to be carried out by an operating system. When the activity is finished, the thread is destroyed.
Term
Multithreading
Definition
Applications that can carry out multiple activities simultaneously by generating different instruction sets (threads).
Term
Software deadlock
Definition
Two processes cannot complete their activities because they are both waiting for system resources to be released.
Term
Process isolation
Definition
Protection mechanism provided by operating systems that can be implemented as encapsulation, time multiplexing of shared resources, naming distinctions, and virtual memory mapping.
Term
Dynamic link libraries (DLLs)
Definition
A set of subroutines that are shared by different applications and operating system processes.
Term
Base registers
Definition
Beginning of address space assigned to a process. Used to ensure a process does not make a request outside its assigned memory boundaries.
Term
Limit registers
Definition
Ending of address space assigned to a process. Used to ensure a process does not make a request outside its assigned memory boundaries.
Term
RAM
Definition
Memory sticks that are plugged into a computer’s motherboard and work as volatile memory space for an operating system.
Term
ROM
Definition
Nonvolatile memory that is used on motherboards for BIOS functionality and various device controllers to allow for operating system-to-device communication. Sometimes used for off-loading graphic rendering or cryptographic functionality.
Term
Hardware segmentation
Definition
Physically mapping software to individual memory segments.
Term
Cache memory
Definition
Fast and expensive memory type that is used by a CPU to increase read and write operations.
Term
Absolute addresses
Definition
Hardware addresses used by the CPU.
Term
Logical addresses
Definition
Indirect addressing used by processes within an operating system. The memory manager carries out logical-to-absolute address mapping.
Term
Stack
Definition
Memory construct that is made up of individually addressable buffers. Process-to-process communication takes place through the use of stacks.
Term
Buffer overflow
Definition
Too much data is put into the buffers that make up a stack. Common attack vector used by hackers to run malicious code on a target system.
Term
Address space layout randomization (ASLR)
Definition
Memory protection mechanism used by some operating systems. The addresses used by components of a process are randomized so that it is harder for an attacker to exploit specific memory vulnerabilities.
Term
Data execution prevention (DEP)
Definition
Memory protection mechanism used by some operating systems. Memory segments may be marked as nonexecutable so that they cannot be misused by malicious software.
Term
Garbage collector
Definition
Tool that marks unused memory segments as usable to ensure that an operating system does not run out of memory.
Term
Virtual memory
Definition
Combination of main memory (RAM) and secondary memory within an operating system.
Term
Interrupt
Definition
Software or hardware signal that indicates that system resources (i.e., CPU) are needed for instruction processing.
Term
Instruction set
Definition
Set of operations and commands that can be implemented by a particular processor (CPU).
Term
Microarchitecture
Definition
Specific design of a microprocessor, which includes physical components (registers, logic gates, ALU, cache, etc.) that support a specific instruction set.
Term
Application programming interface
Definition
Software interface that enables process-to-process interaction. Common way to provide access to standard routines to a set of software programs.
Term
Monolithic operating system architecture
Definition
All of the code of the operating system working in kernel mode in an ad hoc and nonmodularized manner.
Term
Layered operating system architecture
Definition
Architecture that separates system functionality into hierarchical layers.
Term
Data hiding
Definition
Use of segregation in design decisions to protect software components from negatively interacting with each other. Commonly enforced through strict interfaces.
Term
Microkernel architecture
Definition
Reduced amount of code running in kernel mode carrying out critical operating system functionality. Only the absolutely necessary code runs in kernel mode, and the remaining operating system code runs in user mode.
Term
Hybrid microkernel architecture
Definition
Combination of monolithic and microkernel architectures. The microkernel carries out critical operating system functionality, and the remaining functionality is carried out in a client\server model within kernel mode.
Term
Mode transition
Definition
When the CPU has to change from processing code in user mode to kernel mode. This is a protection measure, but it causes a performance hit.
Term
Virtualization
Definition
Creation of a simulated environment (hardware platform, operating system, storage, etc.) that allows for central control and scalability.
Term
Hypervisor
Definition
Central program used to manage virtual machines (guests) within a simulated environment (host).
Term
Security policy
Definition
Strategic tool used to dictate how sensitive information and resources are to be managed and protected.
Term
Trusted computing base
Definition
A collection of all the hardware, software, and firmware components within a system that provide security and enforce the system’s security policy.
Term
Trusted path
Definition
Trustworthy software channel that is used for communication between two processes that cannot be circumvented.
Term
Security perimeter
Definition
Mechanism used to delineate between the components within and outside of the trusted computing base.
Term
Reference monitor
Definition
Concept that defines a set of design requirements of a reference validation mechanism (security kernel), which enforces an access control policy over subjects’ (processes, users) ability to perform operations (read, write, execute) on objects (files, resources) on a system.
Term
Security kernel
Definition
Hardware, software, and firmware components that fall within the TCB and implement and enforce the reference monitor concept.
Term
Multilevel security policies
Definition
Outlines how a system can simultaneously process information at different classifications for users with different clearance levels.
Term
Bell-LaPadula model
Definition
This is the first mathematical model of a multilevel security policy that defines the concept of a secure state and necessary modes of access. It ensures that information only flows in a manner that does not violate the system policy and is confidentiality focused.
Term
Bell-LaPadula model - simple security rule
Definition
A subject cannot read data at a higher security level (no read up).
Term
Bell-LaPadula model - *-property rule
Definition
A subject cannot write to an object at a lower security level (no write down).
Term
Bell-LaPadula model - strong star property rule
Definition
A subject can perform read and write functions only to the objects at its same security level.
Term
Biba model
Definition
A formal state transition model that describes a set of access control rules designed to ensure data integrity.
Term
Biba model - simple integrity axiom
Definition
A subject cannot read data at a lower integrity level (no read down).
Term
Biba model - *-integrity axiom
Definition
A subject cannot modify an object in a higher integrity level (no write up).
Term
Clark-Wilson model
Definition
This integrity model is implemented to protect the integrity of data and to ensure that properly formatted transactions take place. It addresses all three goals of integrity:
Term
Information flow model
Definition
This is a model in which information is restricted in its flow to only go to and from entities in a way that does not negate or violate the security policy.
Term
Noninterference model
Definition
This formal multilevel security model states that commands and activities performed at one security level should not be seen by, or affect, subjects or objects at a different security level.
Term
Brewer and Nash model
Definition
This model allows for dynamically changing access controls that protect against conflicts of interest. Also known as the Chinese Wall model.
Term
Graham-Denning model
Definition
This model shows how subjects and objects should be created and deleted. It also addresses how to assign specific access rights.
Term
Harrison-Ruzzo-Ullman model
Definition
This model shows how a finite set of procedures can be available to edit the access rights of a subject.
Term
Assurance evaluation criteria
Definition
“Checklist” and process of examining the security-relevant parts of a system (TCB, reference monitor, security kernel) and assigning the system an assurance rating.
Term
Trusted Computer System Evaluation Criteria (TCSEC)
Definition
(aka Orange Book) U.S. DoD standard used to assess the effectiveness of the security controls built into a system. Replaced by the Common Criteria.
Term
Information Technology Security Evaluation Criteria (ITSEC)
Definition
European standard used to assess the effectiveness of the security controls built into a system.
Term
Common Criteria
Definition
International standard used to assess the effectiveness of the security controls built into a system from functional and assurance perspectives.
Term
Certification
Definition
Technical evaluation of the security components and their compliance to a predefined security policy for the purpose of accreditation.
Term
Accreditation
Definition
Formal acceptance of the adequacy of a system’s overall security by management.
Term
Open system
Definition
Designs are built upon accepted standards to allow for interoperability.
Term
Closed system
Definition
Designs are built upon proprietary procedures, which inhibit interoperability capabilities.
Term
Maintenance hooks
Definition
Code within software that provides a back door entry capability.
Term
Time-of-check/time-of-use (TOC/TOU) attack
Definition
Attacker manipulates the “condition check” step and the “use” step within software to allow for unauthorized activity.
Term
Race condition
Definition
Two or more processes attempt to carry out their activity on one resource at the same time. Unexpected behavior can result if the sequence of execution does not take place in the proper order.
Supporting users have an ad free experience!