13-6 Flashcards

1
Q

this is a document created by a user that identifies user security requirements

A

protection profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this is a document created by the developer of a particular system that identifies the security capabilities of a particular product

A

security target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

specify individuals security functions that a particular product should provide

A

security functional requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

describe what measures are taken during the development of a product to ensure that it actually complied with the security functionality

A

security assurance requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this is a formal security model that describes various access control rules . one of the earliest computer security models. developed by Bell and Lapadula in 73. designed to enforce access control in gove and military applications

A

Bell - Lapadula Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a system is secure if and only if the state is a secure state and all state transitions are secure, then every subsequent state will also be secure , no matter what inputs occur

A

Bell Lapadula Model basic security theorum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

this model divides a system into a series of subjects and objects

A

bell lapadula model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a ____ is any entity that is attempting to access a system or date. it usually refers to an application or system that is attempting to access a system or data.

A

subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

4 clasification types

A

unclassified, classified, secret, top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this means that a subject can read an object only if the security level of the subject is higher that or equal to the security of the object

A

simple security property or ss property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a subject can write an object only if the security level of the object is higher than or equal to the security level of the subject.

A
  • propert
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this is an older model established in 1977. similar to bell lapadula and also uses subuect and objects. it controls object modification

A

Biba Integrity Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this model comes in three parts. a subject cannot execute objects that have lower level of iegrity than the subject. a subject cannot modify objects that have a higher level of integrity. a subject may not request service that have a hgier integrity level.

A

Biba Integrity Modle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

published in1987, like the Bel Alpadula model its a subject object model. it introduces programs.

A

clark wilson model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the 2 primary elements for achieving data integrity for this model is a well formed transaction and separation of duties.

A

clark wilson model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the ____________ looks a s systems transition from one state to another. start with capoturing the current state of the system. a capture is performed again later and compared to the first to determine if a violation ahs been made

A

State Machine Model

17
Q

the 4 things to eveluate in the state machine model

A

users, states, commands, output

18
Q

was passed as part of the American Recoveries and reinvestment act of 2009. makes several modifications to Hippa

A

HITECH