Term
| BIOS (Basic Input Output System) |
|
Definition
| Firmware used to hold the boot process on early computers. |
|
|
Term
|
Definition
| When an attacker replaces or modifies the BIOS. |
|
|
Term
| UEFI (Unified Extensible Firmware Interface) |
|
Definition
| Used in order to prevent a BIOS Attack by confirming that the BIOS has been Attacked. |
|
|
Term
|
Definition
| BIOS > MBR > Boot Loader > Operating System |
|
|
Term
|
Definition
|
|
Term
|
Definition
Every element of the Boot System must be validated.
The first element validates the next, which validates the next, etc. |
|
|
Term
|
Definition
| The strongest point of the Chain Of Trust is hardware aka the BIOS. |
|
|
Term
| What is the name of the US government classified standard to prevent electromagnetic spying? |
|
Definition
|
|
Term
|
Definition
| Telecommunications Electronics Material Protected From Emanating Spurious Transmissions. |
|
|
Term
| What is Electromagnetic Spying? |
|
Definition
| Picking up electromagnetic fields and read data that is producing them. |
|
|
Term
|
Definition
| Network that moves a product from the supplier to the customer. |
|
|
Term
|
Definition
| Exploiting the different steps of supply chain to inject malware into products during their manufacture or storage. |
|
|
Term
| What are some of the consequences of Supply Chain Infections? |
|
Definition
| Malware can be planted on ROM firmware of a device, before purchase, making it difficult or impossible to clean an infected device after purchase. |
|
|
Term
|
Definition
| Software runs on network device |
|
|
Term
|
Definition
| Software runs on network server |
|
|
Term
|
Definition
| Manages hardware and software on client computer |
|
|
Term
|
Definition
| Firmware designed to manage a specific device. |
|
|
Term
| Typical OS security configuration should include... |
|
Definition
| Disabling unnecessary ports and services, default accounts and passwords, disabling things you don't use and the action of white and black listing. |
|
|
Term
| What makes simple repetitious tasks less tedious? |
|
Definition
|
|
Term
|
Definition
| User interface software for a kiosk. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Software security update to repair discovered vulnerabilities. |
|
|
Term
|
Definition
| Includes enhancements to the software to provide new or expanded functionality. |
|
|
Term
|
Definition
| Accumulates security updates and additional features. |
|
|
Term
| Patch Management Tools are for... |
|
Definition
| Distributing patches and patch reception |
|
|
Term
| Automated Patch Update Service |
|
Definition
| Manages patches locally rather than by the vendor's online update service. |
|
|
Term
|
Definition
| Ensures software is always up to date by automatically downloading and installing patches. |
|
|
Term
|
Definition
| Software that examines a computer for infections. |
|
|
Term
| Heuristic Monitoring (Dynamic Analysis) |
|
Definition
| Uses a variety of techniques to spot characteristics of a virus instead of attempting to make matches. |
|
|
Term
|
Definition
| Dynamic Analysis technique in which the questionable code is run in a virtual environment to determine if its a virus. |
|
|
Term
|
Definition
| Monitors emails for spam and other unwanted content. |
|
|
Term
|
Definition
Blocking certain attachments
Black listing / white listing
Bayesian Filtering |
|
|
Term
|
Definition
| Divides email messages into two piles: spam and nonspam. |
|
|
Term
|
Definition
| Helps prevent computers from becoming infected by different types of spyware. |
|
|
Term
|
Definition
| Small window appearing over Web Site. |
|
|
Term
|
Definition
| Allows user to limit or block most pop-ups. |
|
|
Term
|
Definition
| Tightening security during design and coding of OS. |
|
|
Term
|
Definition
| OS that has been designed through OS hardening. |
|
|
Term
|
Definition
Least Privilege
Reduce Capabilities
Read-Only File System
Kernel Pruning |
|
|
Term
| Four Families of SD Cards |
|
Definition
|
|
Term
|
Definition
| Storage card with integrated wireless transmission capabilities. |
|
|
Term
|
Definition
| Encrypts all files on any network or attached device that is connected to that computer. |
|
|
Term
|
Definition
| Combines the functions of a printer, copier, scanner and fax machine. |
|
|
Term
| What would an attack on a computer's display do? |
|
Definition
| Allow for an attacker to see what is on your display. |
|
|
Term
|
Definition
| Separates a secured area from a non-secured area. |
|
|
Term
| Protected Distributes Systems (PDS) |
|
Definition
| System of cable conduits used to protect classified information that is being transmitted between two secure areas. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Conduit constructed of special electrical metallic tubing |
|
|
Term
|
Definition
| Specialized optical fibers in the conduit that sense acoustic vibrations that occur when an intruder attempts to gain access. |
|
|
Term
| Computer Hardware Security |
|
Definition
| The physical security protecting the hardware of the host system |
|
|
Term
| Application Development Stages |
|
Definition
| Development, Testing, Staging and Production |
|
|
Term
| Application Development Lifecycle Models |
|
Definition
|
|
Term
| Waterfall Model of Application Development |
|
Definition
| You don't start a phase until you finish the previous phase. |
|
|
Term
| Secure DevOps Methodology |
|
Definition
| The development and the operations team are the same team. |
|
|
Term
|
Definition
| The enterprise-wide configuration, development, and management of multiple types of IT system resources. |
|
|
Term
|
Definition
| In application development is removing a resource that is no longer needed. |
|
|
Term
| Secure DevOps in an example of what kind of model of Application Development? |
|
Definition
| Agile, as it goes through changes. |
|
|
Term
| Two important factors of secure coding are...? |
|
Definition
| Ensuring that memory management is handled properly and encrypting the code. |
|
|
Term
|
Definition
| Searches for errors that code prevent the application from compiling from source code to application code. |
|
|
Term
|
Definition
| Looks for errors after the program has compiled correctly and is running. |
|
|
Term
|
Definition
| Tools that examine software without executing the program |
|
|
Term
| Dynamic analysis (fuzzing) |
|
Definition
| A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a program |
|
|
Term
|
Definition
| Puts the application under a heavier than normal load to determine if the program is robust and can perform all error handling correctly |
|
|
Term
|
Definition
| An “attestation mechanism” designed to be able to convince a remote party that an application is running only a set of known and approved executables |
|
|