Test Your Security Architecture Knowledge

FastPacedLobster avatar
FastPacedLobster
·
·
Download

Start Quiz

Study Flashcards

24 Questions

What is security architecture?

The logical design of a computer system with a focus on security components

What is security architecture?

The logical hardware, operating system, and software security components and how to implement them

What is the purpose of layering in security architecture?

To separate processes and resources

What is layering in security architecture?

The separation of a complex task into multiple sub-tasks

What is the ring model?

A type of CPU hardware layering that separates and protects domains

What is abstraction in security architecture?

The hiding of unnecessary details from the user

What is a security domain?

The list of objects a subject is allowed to access

What is a security domain?

The list of objects a subject is allowed to access

What is the Ring Model?

A form of CPU hardware layering

What is a Trusted Computing Base (TCB)?

The totality of protection mechanisms within a computer system responsible for enforcing a security policy

What is the Reference Monitor?

An abstract machine that mediates all access subjects have to objects

What is the difference between an open and closed system?

An open system uses open hardware and standards using standard components from a variety of vendors, while a closed system uses proprietary hardware or software

What is the Trusted Computing Base (TCB)?

The totality of protection mechanisms within a computer system responsible for enforcing a security policy

What is the Security Kernel?

A software component that enforces the Reference Monitor concept

What is the purpose of the CPU in a computer system?

To execute instructions and perform calculations

What are the three fundamental principles that the Reference Monitor and the Security Kernel must satisfy?

Completeness, isolation, verification

What is a virtual machine?

A software program that simulates a computer system

What is the Security Perimeter?

The imaginary boundary that divides the trusted from the untrusted

What is a trusted operating system?

An operating system that has a high degree of assurance that its security features have been implemented correctly

What is the IOS kernel responsible for?

Managing hardware resources

What is the difference between the original IOS and the new IOS?

The original IOS used a microkernel design, while the new IOS is based on a monolithic kernel design

What is the purpose of the Security Perimeter?

To divide the trusted from the untrusted

What is the SCOMP system?

An operating system with a specialized kernel

What is IOS?

A hardware-based operating system

Study Notes

Security Architecture and Models

  • Security architecture and design entails the logical hardware, operating system, and software security components and how to implement them to architect, build, and evaluate the security of computer systems.

  • Security architecture provides a view of the overall system architecture from a security point of view and how the system is put together to satisfy the security requirements.

  • Layering separates processes and resources, adds modularity to the system, and is the separation of a complex task into multiple sub-tasks.

  • The operating system is divided into a number of layers, and each layer is built on top of lower layers.

  • Abstraction hides unnecessary details from the user, which adds to more security.

  • A security domain is the list of objects a subject is allowed to access, and domains are groups of subjects and objects with similar security requirements.

  • An OS should be able to enforce the security principals (CIA), and the proper design and building of a system is called "Security System Architecture."

  • The ring model is a form of CPU hardware layering that separates and protects domains such as kernel mode and user mode from each other.

  • An open system uses open hardware and standards using standard components from a variety of vendors, while a closed system uses proprietary hardware or software.

  • Secure Hardware Architecture focuses on the physical computer hardware required to have a secure system.

  • The central processing unit (CPU) is a microprocessor that contains a control unit (CU), an arithmetic logic unit (ALU), and registers, which are holding places for data and instructions.

  • The operating system creates a virtual environment (virtual machine) for the application to work in and allots it a segment of virtual memory.Summary of "Secure Operating System and Software Architecture"

  • There are four different operating states in which processes can work within.

  • Secure OS and software architecture build upon the secure hardware providing a secure interface between hardware and applications.

  • Operating systems provide memory, resource, and process management.

  • An ordinary OS addresses several functions that involve computer security, including authentication of users and protection of memory.

  • A trusted OS provides a set of security features together with an appropriate degree of assurance that the features have been assembled and implemented correctly.

  • Security must be considered in every aspect of the trusted OS design.

  • Trusted Computing Base (TCB) is the totality of protection mechanisms within a computer system responsible for enforcing a security policy.

  • The Reference Monitor and the Security Kernel must satisfy three fundamental principles: completeness, isolation, and verifiability.

  • Security Perimeter is the imaginary boundary that divides the trusted from the untrusted.

  • Trusted functions may be privileged to modify kernel databases and bypass certain requirements of the security policy.

  • The Reference Monitor is an abstract machine that mediates all access subjects have to objects.

  • The Security Kernel implements the concept of reference monitor and enforces the reference monitor concept.Overview of IOS Kernel and Operating System

  • IOS stands for Internetwork Operating System

  • RMC refers to Remote Monitoring and Control

  • IOS is a hardware-based operating system

  • The IOS kernel is responsible for managing hardware resources

  • The original IOS was based on a monolithic kernel design

  • The new IOS uses a microkernel design

  • IOS interfaces include ISOS and RMC interfaces

  • The kernel implementation strategies vary based on the case

  • The SCOMP system is an example of a kernelized system with a specialized operating system

  • The SCOMP system uses a simple operating system on top of the kernel

  • The simple operating system provides more user-friendly features

  • The SCOMP system is a case of a new operating system implementation.

Test your knowledge on Security Architecture and Models with this informative quiz. Learn about the different components of security architecture, layering, abstraction, security domains, and more. Explore the basics of secure hardware architecture and operating system design, including the trusted OS, reference monitor, security kernel, and security perimeter. Additionally, get an overview of the IOS kernel and operating system, including the different kernel implementation strategies and examples of new operating system implementations. Challenge yourself and see how much you know about this crucial aspect of

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser