Midterm Exam (Intro to Security) Part 2

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/228

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

229 Terms

1
New cards

User Mode

Basic mode used by CPU when executing user applications. CPU only allows portion of its full instruction set; to protect from damage by users/malicious users/programs

2
New cards

Privileged Mode

Gives OS full access to instructions supported by the CPU (aka) the nerve center (Execution privileges)

  • Privileged mode

  • Supervisory mode

  • System mode

  • Kernel mode

These are not the same as access permissions. All user applications run in user mode, with the application passing request to the OS using a system call (if approved, request is executed in privileged mode process outside of user’s control...

3
New cards

What are the two OS process states?

Supervisor state

  • privileged all-access mode

  • used when process must perform an action that requires privileges that are greater than the problem state’s set of privileges

Problem state

  • user mode; with low privileges and all access requests need checked against credentials for authorization before granted or denied

4
New cards

What are the 4 main operating states?

Ready

  • Process ready to resume or begin processing as soon as it is scheduled for execution

Waiting

  • process ready for continued execution but is waiting for a device or access request to be serviced before it can continue processing

    • Blinking cursor —> not accessing any resource

Running

  • Process executes on CPU and keeps going until it is finished

Stopped

  • Process finished or must be terminated

5
New cards

What are the types of Read-Only Memory (RAM)?

ROM - Read-only Memory

PROM - Programmable Read-Only Memory

EPROM - Erasable Programmable Read-Only Memory

EEPROM - Electronically Erasable Programmable Read-Only Memory

Flash Memory

6
New cards

ROM - Read-only Memory

Factory provided, does not change

7
New cards

PROM - Programmable Read-Only Memory

Similar to ROM but has special functionality that allows end users to burn in the chip’s contents later

  • Only once

  • Could reprogram later

8
New cards

EPROM - Erasable Programmable Read-Only Memory

Can be erased/changed

  • UVEPROM is erased by UV light

    • Used the UV light to rewrite it

9
New cards

EEPROM - Electronically Erasable Programmable Read-Only Memory

Uses electric voltages delivered to pins of chip force erasure

10
New cards

Flash Memory

Nonvolatile form of storage media that can be electronically erased and rewritten (in block pages)

  • NAND flash, most common (used in memory cards, thumb drives, mobile devices, and SSDs)

11
New cards

Static RAM

Uses a logical (and more sophisticated) device known as a flip-flop

  • Flip-flop = an on/off switch that must be moved from one position to another to change a 0 to 1 and vice versa

Uses flip flops, remains unaltered till the power is gone

  • RAM can go to any part of the memory and use it

Tapes used to have to go through it to find a certain point

12
New cards

Dynamic RAM

Uses a series of capacitors, tiny electrical devices that hold a charge (a bit) or do not hold a charge (a 0 bit)

  • Charge = 1

  • No charge = 0

  • Capacitors lose charges over time, so the CPU has to spend time refreshing the contents of [this] to ensure that 1 bits don’t unintentionally change to 0

Bit flipping = leave something sitting to long to the point it loses charge

  • Not a good thing!!

13
New cards

Do computers us dynamic or static RAM?

Most computers contain a combination of both

14
New cards

What does RAM consist of?

Random access memory

  • Readable and writable memory that contains information a computer uses during processing

    • Useful only for temporary storage

Real memory (Main Memory, Primary Memory)

  • Largest RAM storage resource available to a computer

    • Composed of a number of dynamic RAM chips

Cache RAM

  • Helps improve performance by taking slower devices and temporarily storing them in faster devices when repeated use is likely. Modern CPUs include up to 3 levels of on-chip cache (with levels 1 and 2 dedicated to a single processor core and L3 shared between cores)

    • Tabs you leave open must be reloaded since it has been pushed off but can pull up quickly without looking up again

15
New cards

ARM

Always a 32-bit system

  • 32 registers

  • More functionality

16
New cards

X86

32 or 64-bit system

  • Very picky what you do with registers

17
New cards

Registers

Limited amount of onboard memory; Provide CPU with directly accessible memory locations that all ALU use when preforming calculations or processing instructions

  • CPU does have storage —> move fast as CPU

  • Typically CPUs have 8 to 32 [this] that are often either 32 or 64 bits in size

    • ARM

    • X86

Any data that the ALU needs to manipulate must be loaded into a register unless it is directly supplied as part of the instruction

Advantage: this memory is part of the ALU and operates along with the CPU at typical CPU speeds

  • Math is done on the CPU in the register  Can not do from storage

18
New cards

Register Addressing

CPU uses this when it needs information from one of its registers

19
New cards

Memory Addressing

Determined by bit depth, can only count up so high

  • Max RAM is 17 billion Gigabits

  • EAX —> Hard code address

20
New cards

Immediate Addressing

Refers to data that is supplied to CPU as part of an instruction

  • Out of RAM to you

21
New cards

Direct Addressing

CPU provided with actual address of memory location to access

  • From memory

22
New cards

Indirect Addressing

Memory address contains another memory address; CPU reads indirect address to learn the address where desired data resides and retrieves the actual operand from that address

  • Paging —> Look up memory address to find another

23
New cards

Base + Offset Addressing

Uses a value stored in one of the CPU registers as the base location from which to begin counting. CPU adds offset supplied to base address and retrieves operand from that computed memory location

  • Array addressing

24
New cards

Secondary Memory

Magnetic, optical, flash-based media or other storage devices that contain data not immediately available to the CPU

  • When we want something to last and not disappear when we shit off the computer

    • RAM is volatile

    • Secondary memory = Non-volatile

25
New cards

Virtual Memory

Special type of secondary memory that the operating system manages just like real memory

Two types:

  • Primary Memory

  • Primary Drawback

Need for virtual memory is reduced with larger banks of actual physical RAM; performance challenges can be reduced by using a flashcard or SSD to host the virtual memory paging file

Only thing loaded is the current tab you are on

There is the possibility of something on RAM leading onto secondary memory though virtual memory

26
New cards

Primary memory

RAM —> Dynamic = Most common since it is cheaper —> made with many tiny compensator

27
New cards

Primary Drawback

The paging operations that occur when data is exchanged between primary and secondary memory are relatively slow

28
New cards

Storage

Primary (RAM) vs secondary (magnetic/optical media)

Volatile (data lost if power goes out, primary) vs Nonvolatile (retain data)

  • Nonvolatile = must be encrypted

Random (allow OS to read and write from any point using addressing – usually primary storage) vs sequential (require that you read everything; magnetic tape)

  • Random uses addressing (64-bit system = 64 bit addressing)

    • Python lists

  • Sequential —> magnetic tape

29
New cards

Cold Boot Attack

Memory compromise that freezes memory chips to delay the decay of resident data when the system is turned off or the RAM is pulled out of the motherboard

  • Literally freeze the memory —> the decay of the electrons becomes much slower and the pull the RAM

30
New cards

Data Remanence

Data remains after it is erased

  • Remaining data

  • Affects the HHD

    • Do seven random drive wipes to bury it deep enough

31
New cards

Data retention

How long someone holds onto data

32
New cards

Tempest

Countermeasures and safeguards used to protect against emanation attacks

  • Originally a government research study aimed at protecting electronic equipment from the electromagnetic pulse (EMP) emitted during nuclear explosions

    • EMPs commonly occur during nuclear

      • Can be from a solar storm

        • Solar flares

33
New cards

What are some countermeasures to Tempest?

Faraday Cage

  • Push it to the ground

  • CIA can’t hear you now

  • Ground conductors take the electrons and take it to ground

White Noise

  • Fill the air around the eminence with noise so it can be found

Control Zone

  • Create a gap so that it can’t be reached

Others

  • Shielding, access control, and antenna management

34
New cards

What are some input and output devices?

Monitors

Printers

Keyboards/Mice

Modems

35
New cards

Monitors

Less of an issue with modern monitors; should surfing/telephoto lenses more of concern

36
New cards

Printers

Physical security; local data storage; network exposure; multi-function/fax

  • Hate the security of these things

37
New cards

Keyboards/Mice

Vulnerable to TEMPEST monitoring; keystroke logging; Bluetooth

38
New cards

Modems

Allow users to create uncontrolled access points into your network; only if connected to operational telephone landline

  • Hate the security of these things

39
New cards

Firmware

Microcode

Software that is stored in a ROM or an EEPROM chip

  • Changed infrequently and drives basic operation of a computing device

  • Should make sure to update firmware

Hardware = can tough it

Software = zeros and ones

40
New cards

What does BIOS stand for?

Basic Input/Output system

41
New cards

Basic Input/Output system (BIOS)

Contains the operating system-independent primitive instructions that a computer needs to start up and load the operating system from disk. It is contained in the firmware device that is accessed at boot time and stored on an EEPROM chip to facilitate version updates (i.e. flashing the BIOS)

42
New cards

What does UEFI stand for?

Unified Extensible Firmware Interface

Most system manufacturers have replaced traditional BIOS with this; larger hard drives, faster boot times, enhanced security, use of a mouse

43
New cards

Flashing

Process of updating UEFI, BIOS or firmware. If hackers or malware can alter, they may be able to bypass security features or initiate otherwise prohibited activities

44
New cards

Phlashing

Malicious variation of official BIOS or firmware is installed that introduces remote control or other malicious features into a device

45
New cards

Boot attention/Secure Boot

Feature of UEFI that aims to protect the local OS by preventing the loading or installing of device drivers or an OS that is not signed by a preapproved digital certificate. Protects systems against a range of low-level or boot-level malware (rootkits or backdoors). Only drivers that pass attestation are allowed to be installed and loaded on the local system

46
New cards

Attestation

Verification and approval process accomplished through the validation of a digital signature

47
New cards

Measured Boot

An optional feature of UEFI that takes a hash calculation of every element involved in the booting process

  • Hashes are performed by and stored in the Trusted platform model (TPM)

  • If new hash does not reflect old ones then something happened

48
New cards

Applets

Code objects sent from the server to a client to perform some actions usually self-contained mini-programs (JAVA clients)

JAVA applets - Short JAVA programs transmitted over the internet to perform operations on a remote system

49
New cards

Zip Bomb

make it so that the zip file, when opened, explodes lit 4 terabit file  fills computer up

  • Just takes up space and crashes  can lead to not being able to reboot computer —>there is a way to fix it

  • Elephant toothpaste

50
New cards

Local Caches

Anything that is temporarily stored on the client for future reuse

  • ARP cache poisoning —> redirect website

  • DNS cache poisoning —> Go to server

  • Hosts —> Pirating things (borrow)

    • Created as a way to troubleshoot

  • Temporary Internet Files —> Need to purge often

  • Split DNS —> Public use and internal use

    • Poison internally but becomes external

  • Pirates have a cache where they store their loot

    • CSS can be bulky

51
New cards

What are the two server-based systems?

Data flow control

Load balancer

52
New cards

Data Flow Control

Movement of data between processes, between devices, across a network, or over communication channels.

  • Ensures efficient transmission with minimal delays or latency; with reliable throughput using hashing and confidentiality with encryption.

  • Ensures receiving systems not overloaded with traffic.

    • Ex.) Directing people  too many people = increase lanes  back down = back to two lanes

  • Traffic scrubbing

53
New cards

Load Balancer

Used to spread or distribute network traffic load across several network links/devices.

  • Used to obtain optimal infrastructure utilization, minimize response time, maximize throughput, reduce overloading, and eliminate bottlenecks.

    • Ex.) server farm or cluster

54
New cards

Aggregation

Comines records from one or more tables to produce useful information risk: can allow unauthorized individuals to see information

55
New cards

Data Aggregation

Same as aggregation

  • Data is made of tables (like excel spreadsheet), has rows, tables, records (entry)

  • All related thorough keys

56
New cards

Inference

Attacks involve combining several pieces of non-sensitives information to gain access to information that should be classified at a higher level

  • Making inference of unrelated data that could actually be true and very secretive

    • Not supposed to know!!

57
New cards

Data Mining and Data Warehousing

Normally contain detailed historical data not normally in production databases

  • Facebook give information and sells it to the highest buyer

58
New cards

Data Dictionary

Used for storing critical information about data, including usage, type, sources, relationships, and formations

59
New cards

Data mining techniques

Help predict future activities and find correlated information

60
New cards

Metadata

Data about data (that’s it)

61
New cards

Data Analytics

The science of raw data examination focusing on extracting useful information (Do a lot of aggregation)

62
New cards

Big Data

Collection of data so large that traditional means of analysis or processing are ineffective, inefficient, or insufficient

  • Social media data!!!

63
New cards

Large-Scale Parallel Data Systems

Computation system designed to perform numerous calculations simultaneously and include dividing up a large task into smaller elements then distributing each sub element to a different processing subsystem for parallel computation

64
New cards

Parallel data systems or parallel computing

Computation system designed to perform numerous calculations simultaneously.

  • Can divide large tasks into smaller elements, distribute to each subelement to a different processing subsystem for parallel computation.

  • Can be accomplished using distinct CPUs or multicore CPUs, virtual systems, or combo

  • Like you’re in a video card

    • Solving a lot of problems at same time

    • Take big tasks —> split to smaller tasks —> complete each one —> put them back together at the end

65
New cards

Large-scale parallel data systems

Must be concerned with performance, power consumption, and reliability/stability issues

  • SMP

  • AMP

  • MPP

66
New cards

What does SMP stand for?

Symmetric multiprocessing

67
New cards

What does AMP stand for?

Asymmetric Multiprocessing

68
New cards

What does MPP stand for?

Massive Parallel Processing

69
New cards

Symmetric multiprocessing (SMP)

Processes share common OS, data bus, memory

  • Synchronized, uses the same computer clock, all happens on same time

70
New cards

Asymmetric Multiprocessing (AMP)

Processes operate independently; each processor has its own OS, dedicated data bus, memory

  • Happens when it needs happens

71
New cards

Massive Parallel Processing (MPP)

numerous AMP linked together to work on a single primary task across multiple processes in multiple linked systems

  • Every digital entities —> websites, etc.

72
New cards

Grid Computing

A form of parallel distributed processing that loosely groups a significant number of processing nodes to work toward a specific processing goal.

  • Typically join when system idle

  • When system leaves, it saves its work and may upload completed or partial work elements back to the grid

  • Concerning that each work packet is exposed to the world

  • Grid members could also keep copies of each work packet and examine its contents

  • Chunk and a connection and another chunk and a connection and so on

    • Loosely grouped nodes working together

73
New cards
74
New cards

Industrial Control System

A form of computer management device that controls industrial processes and machines (aka operational technology (OT)).

75
New cards

Distributed Control Systems (DCSs)

Found in industrial process plants; control over a large-scale environment (manufacturing floor/production line) from a single location (centralized monitoring command); focus on processes/state driven

  • Little computers with centralized node that keeps them all synchronized

76
New cards

Programmable Logic Controllers (PLCs)

Single-purpose or focused-purpose digital computers. Used for management of electromechanical operations (assembly line or large-scale digital lighting system)

  • Need control

  • Critical infrastructure  nuclear reactor goes down…not good, etc.

  • Oil wells use PLCs

  • Sensors —> Input, processors (ladder circuit), output (actuators) —> actors

    • Not the best for security

      • So critical to have thus makes it less secure

        • Need to have immediate access!!!!

77
New cards

Supervisory Control and Data Acquisition (SCADA)

Can operate as standalone device, networked together with other SCADA systems, or networked with traditional IT; HMI (Human-machine interface) as it enables people to better understand, oversee, manage, and control complex machine and technology systems; is event-driven;

  • Legacy SCADA is designed with minimal human interface. Often have mechanical buttons or simple LCDs. Often poorly secured and not frequently updated (i.e., Stuxnet)

  • DCS with an interface basically

78
New cards

Distributed Computing Environment (DCE)

A collection of individual systems that work together to support a resource or provide a service

  • Parallelism

  • Makes up all WEB 2 nowadays

79
New cards

Interface Design Language (IDL)

Which is used to define the interface between the client and server processes or objects in a distributed system

80
New cards

What does MFA stand for?

Multi-factor Authorization

81
New cards

What does HPC stand for?

High-performance Computing systems

82
New cards

High-performance Computing systems (HPC)

Computing platforms designed to perform complex calculations or data manipulations at extremely high speeds.

  • Limited processing

Used when real-time or near real-time processing of massive data is necessary for a particular task or application

  • Ex that use HPC) mobile devices/apps, IoT devices, ICS solutions, streaming media, voice assistants, 3D modeling and rendering, AI/ML calculations

Composed of: computer resources, network capabilities, and storage capacity; each element must be able to provide equivalent capabilities in order to optimize overall performance

83
New cards

Edge computing

Swing back, has a centralized computing system but pushes it all out so that it is distributed

  • WOW (world of warcraft) also used edge servers originally

Philosophy of network design where data and compute resources are located as close as possible in order to optimize bandwidth use while minimizing latency.

  • Intelligence and processing are contained within each device/each device processes its own data locally

  • Computations are performed closer to the data source, which is at/near the edge of the network

  • Relies on IOT

84
New cards

Fog Computing

Relies on sensors, IoT devices, or edge computing devices to collect data and transfer back to a central location for processing.

  • Intelligence and processing are centralized in the LAN

85
New cards

What does RTOS stand for?

Real-time Operating System

86
New cards

Real-time Operating System (RTOS)

Designed to process or handle data as it arrives on the system with minimal latency or delay

Usually stored on ROM and is designed to operate in a hard real-time or soft real-time condition

Two types:

  • Hard real-time

  • Soft real-time

Security Concern:

  • Often focused/single-purpose; often use custom/proprietary code (which can include bugs); could be overloaded/distracted by malware-initiated process requests or false datasets

    • Security processes always add lateny

87
New cards

Hard Real-time (RTOS)

For mission critical operations where delay must be eliminated or minized for safety (i.e., autonomous vehicles)

  • Assisted Braking systems  needs to be processed right away

88
New cards

Soft Real-Time (RTOS)

Used when some level of modest delay is acceptable under typical or normal conditions (i.e., consumer electronics)

  • Loading screen, temperature control in a car

89
New cards

Event-driven RTOS

Switches between operations or tasks based on pre-assigned priorities

  • Does things based on events

  • When something happens it does something

90
New cards

Time-sharing RTOS

Switches between operations or tasks on clock interrupts or specific time intervals

  • Does something for some amount of time

91
New cards

What does IOT stand for?

Internet of Things

92
New cards

Internet of Things (IOT)

Internet-connected smart devices that provide automation, remote control, or AI processing to traditional or new appliances or devices in a home or office setting.

  • Fridges, thermometers, etc.

  • IoT devices can be great or gimmicky

    • Computer in a refrigerator

    • A thermostat could be hacked and a smart one holds the information of when you are not at the house which gives the hackers the same information

Security is related to access and encryption – typically devices do not have a robust security setup

  • Want it to be easier to use thus they are less secure

    • You personally should increase encryption and password changes

  • Patching/updating firmware is also a problem

  • Setting up a distinct network for IoT devices can keep them separate from the primary network (and thus provide more security)

  • In organizations, it is important to consider IoT assets – as they can be ubiquitous

93
New cards

What does APT stand for?

Advanced Persistent threat

94
New cards

Embedded System

Any form of computing component added to an existing mechanical or electrical system for the purpose of providing automation, remote control, and/or monitoring

  • Industrial control systems, PLC, generally do with life or death

95
New cards

Static systems (envirorments)

A set of conditions, events, and surroundings that don’t change; to prevent users reducing security or changing operations

  • Ex) Check-in kiosk at airport; ATM; guest computer at hotel or library

  • In technology – examples are: OSs, hardware sets, or networks that art configured for a specific need, capability, or function, and then set to remain unaltered.

  • They do not change!!! —> Dynamic = change

96
New cards

Network-Enabled Devices

Any type of device (whether mobile or stationary) that has native network capabilities

  • Assumes network is wireless; primarily provided by a mobile telecommunications company but could also mean Wi-Fi or wired

    • Examples of Network-enabled devices: are smartphones, mobile phones, tablets, smart TVs, set-top boxes, HDMI-stick streaming media players, network-attached printers, game systems, etc...

Embedded systems: network-attached printers, smart TVs, HVAC controls, smart appliances, smart thermostats, vehicle entertainment/driver assist/self-driving systems, and medical devices.

  • Network-enabled devices may be embedded systems or used to create embedded systems

97
New cards

Cyber-Physical Systems

Devices that offer a computational means to control something in the physical world

  • Ex. Prosthetics, robotics, collision detection, lot in military

98
New cards

Mainframes

High-end computer systems used to perform highly complex calculations and provide bulk data processing; considered static

99
New cards

Modern Mainframes

More flexible/virtual machines; could be static

100
New cards

Specialized Equipment

Anything designed for one specific purpose, to be used by a specific type of organization, or to perform a specific function

  • Type of DCS, IoT, smart device, endpoint device, or edge computing system

  • Used for one specific thin!!! Does one thing and nothing else!!!