Shared Flashcard Set

Details

2D - SES 622 - Module 4 - ConOps
N/A
24
Engineering
Graduate
05/02/2012

Additional Engineering Flashcards

 


 

Cards

Term
What does OODA stand for?
Definition
1. Observation
2. Orientation
3. Decision
4. Action
Term
What happens during the observation stage?
Definition
Outside information (inputs) come into the system.
Term
What happens during the orientation stage?
Definition
Inputs are correlated with experience, traditions, other inputs, and other embedded information.
Term
What happens during the decision stage?
Definition
Observations and information taken from the orientation stage is arranged into if --> then statements in order to make decisions.
Term
What happens during the action statge?
Definition
The decision is enacted.
Term
Multilateral Security
Definition
A concept that considers different and possibly conflicting security requirements of different parties
and strives to balance these requirements.
Term
What is the main security traid?
Definition
1. Detect
2. Delay
3. Response
Term
What is the core princile of defense in depth?
Definition
Provide multiple independent safeguards on every attack path.
Term
What does it mean to have balanced protection?
Definition
All attack paths should be covered equally.
Term
What does it mean to have graded protection?
Definition
Attack paths are protected in a way commensurate with its importance, or consequence of loss.
Term
What are four examples of Security Collaborators and Decision-makers?
Definition
1. Senior managers
2. Designers and developers
3. Administrators.
4. Security Team members.
Term
User communities are separated by?
Definition
Distinct use cases. Note: Trust assumptions should always be questioned.
Term
What are the two options for a security response?
Definition
1. Deterrance: rending the target unattractive.
2. Defeat: Resiting and neutralizing the adversary.
Term
What are five ways on manageing security risk?
Definition
1. Avoidance: remove target of attack from physical location.
2. Reduction: Reduce attactiveness of target.
3. Spreading: Employ defer and delay mechanisms to reduce access to the wole target at once
4. Transfer: insure target or otherwise share loss liability.
5. Acceptance
Term
Intrusion Containment (Principle)
Definition
If the presense of the perpetrator is obvious, then make it difficult to escape.
Term
What are the four main consideration of security policy?
Definition
1. Enforcement
2. Ease of communication.
3. Available when needed
4. comprehensivness.
Term
Secuity requirements should have two main qualities?
Definition
Meaningful and measurable
Term
What is a system mode?
Definition
A distinct operating state during which a set of system functions are performed to a given degree.
Term
What are three common system modes?
Definition
1. Fully operational.
2. Maintenance
3. Failure
Term
What is system state?
Definition
A static snapshot of the variable needed to fully describe the system's capability to perform system functions. Note: The variables do not change, just the values of the variables.
Term
What are the four main parts of a system function?
Definition
1. Inputs
2. Outputs
3. Activation (triggers)
4. Exit criteria
Term
An alternative design solution should be modeled to what level of detail?
Definition
A level of detail that permits comparison against the specifications expressed in the system requirements and the performance, costs, time scales (including time to market/deployment), and risks expressed in the stakeholder requirements.
Term
What should a Pugh matrix contain?
Definition
1. System alternative designs.
2. User/customer requirements
3. "-", "S", "+"
Term
Is there an ultimately right solution to the problem of system security?
Definition
No. It is a planning problem of wicked proportion, and there is merely a goal of situational improvement for which the planner has solemn accountability
Supporting users have an ad free experience!