2 cissp ® Official Study Guide Eighth Edition


Understand embedded systems and static environments



Download 19,3 Mb.
Pdf ko'rish
bet375/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   371   372   373   374   375   376   377   378   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Understand embedded systems and static environments.
An embedded system is typi-
cally designed around a limited set of specific functions in relation to the larger product of 


394
Chapter 9 

Security Vulnerabilities, Threats, and Countermeasures
which it’s a component. Static environments are applications, OSs, hardware sets, or net-
works that are configured for a specific need, capability, or function, and then set to remain 
unaltered.
Understand embedded systems and static environment security concerns.
Static environ-
ments, embedded systems, and other limited or single-purpose computing environments 
need security management. These techniques may include network segmentation, security 
layers, application firewalls, manual updates, firmware version control, wrappers, and con-
trol redundancy and diversity.
Understand how the principle of least privilege, separation of privilege, and accountability 
apply to computer architecture.
The principle of least privilege ensures that only a mini-
mum number of processes are authorized to run in supervisory mode. Separation of privi-
lege increases the granularity of secure operations. Accountability ensures that an audit 
trail exists to trace operations back to their source.
Be able to explain what covert channels are.
A covert channel is any method that is used 
to pass information but that is not normally used for information.
Understand what buffer overflows and input checking are.
A buffer overflow occurs 
when the programmer fails to check the size of input data prior to writing the data into a 
specific memory location. In fact, any failure to validate input data could result in a secu-
rity violation.
Describe common flaws to security architectures.
In addition to buffer overflows, pro-
grammers can leave back doors and privileged programs on a system after it is deployed. 
Even well-written systems can be susceptible to time-of-check-to-time-of-use (TOCTTOU) 
attacks. Any state change could be a potential window of opportunity for an attacker to 
compromise a system.
Written Lab

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   371   372   373   374   375   376   377   378   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish