2 cissp ® Official Study Guide Eighth Edition


Technology and Process Integration



Download 19,3 Mb.
Pdf ko'rish
bet370/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   366   367   368   369   370   371   372   373   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Technology and Process Integration
It is important to evaluate and understand the vulnerabilities in system architectures, 
especially in regard to technology and process integration. As multiple technologies and 
complex processes are intertwined in the act of crafting new and unique business functions, 
new issues and security problems often surface. As systems are integrated, attention should 
be paid to potential single points of failure as well as to emergent weaknesses in 
service-
oriented architecture (SOA)
. An SOA constructs new applications or functions out of exist-
ing but separate and distinct software services. The resulting application is often new; thus, 
its security issues are unknown, untested, and unprotected. All new deployments, especially 
new applications or functions, need to be thoroughly vetted before they are allowed to go 
live into a production network or the public internet.
Electromagnetic Radiation
Simply because of the kinds of electronic components from which they’re built, many com-
puter hardware devices emit electromagnetic (EM) radiation during normal operation. The 


390
Chapter 9 

Security Vulnerabilities, Threats, and Countermeasures
process of communicating with other machines or peripheral equipment creates emanations 
that can be intercepted. It’s even possible to re-create keyboard input or monitor output 
by intercepting and processing electromagnetic radiation from the keyboard and computer 
monitor. You can also detect and read network packets passively (that is, without actually 
tapping into the cable) as they pass along a network segment. These emanation leaks can 
cause serious security issues but are generally easy to address.
The easiest way to eliminate electromagnetic radiation interception is to reduce emana-
tion through cable shielding or conduit and block unauthorized personnel and devices from 
getting too close to equipment or cabling by applying physical security controls. By reduc-
ing the signal strength and increasing the physical buffer around sensitive equipment, you 
can dramatically reduce the risk of signal interception.
As discussed previously, several TEMPEST technologies could provide protection 
against EM radiation eavesdropping. These include Faraday cages, jamming or noise 
generators, and control zones. A 
Faraday cage
is a special enclosure that acts as an EM 
capacitor. When a Faraday cage is in use, no EM signals can enter or leave the enclosed 
area. 
Jamming
or 
noise generators
use the idea that it is difficult or impossible to retrieve a 
signal when there is too much interference. Thus, by broadcasting your own interference, 
you can prevent unwanted EM interception. The only issue with this concept is that you 
have to ensure that the interference won’t affect the normal operations of your devices. One 
way to ensure that is to use 
control zones
, which are Faraday cages used to block purposely 
broadcast interference. For example, if you wanted to use wireless networking within a 
few rooms of your office but not allow it anywhere else, you could enclose those rooms in 
a single Faraday cage and then plant several noise generators outside the control zone. This 
would allow normal wireless networking within the designated rooms but completely pre-
vent normal use and eavesdropping anywhere outside those designated areas.
Summary
Designing secure computing systems is a complex task, and many security engineers have 
dedicated their entire careers to understanding the innermost workings of information 
systems and ensuring that they support the core security functions required to safely oper-
ate in the current environment. Many security professionals don’t necessarily require an 
in-depth knowledge of these principles, but they should have at least a broad understand-
ing of the basic fundamentals that drive the process to enhance security within their own 
organizations.
Such understanding begins with an investigation of hardware, software, and firmware 
and how those pieces fit into the security puzzle. It’s important to understand the principles 
of common computer and network organizations, architectures, and designs, including 
addressing (both physical and symbolic), the difference between address space and memory 
space, and machine types (real, virtual, multistate, multitasking, multiprogramming, multi-
processing, multiprocessor, and multiuser).


Exam Essentials 
391
Additionally, a security professional must have a solid understanding of operating states 
(single-state, multistate), operating modes (user, supervisor, privileged), storage types (pri-
mary, secondary, real, virtual, volatile, nonvolatile, random, sequential), and protection 
mechanisms (layering, abstraction, data hiding, process isolation, hardware segmentation, 
principle of least privilege, separation of privilege, accountability).
No matter how sophisticated a security model is, flaws exist that attackers can exploit. 
Some flaws, such as buffer overflows and maintenance hooks, are introduced by program-
mers, whereas others, such as covert channels, are architectural design issues. It is impor-
tant to understand the impact of such issues and modify the security architecture when 
appropriate to compensate.
Exam Essentials

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   366   367   368   369   370   371   372   373   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish