13-6 Flashcards
this is a document created by a user that identifies user security requirements
protection profile
this is a document created by the developer of a particular system that identifies the security capabilities of a particular product
security target
specify individuals security functions that a particular product should provide
security functional requirements
describe what measures are taken during the development of a product to ensure that it actually complied with the security functionality
security assurance requirements
this is a formal security model that describes various access control rules . one of the earliest computer security models. developed by Bell and Lapadula in 73. designed to enforce access control in gove and military applications
Bell - Lapadula Model
a system is secure if and only if the state is a secure state and all state transitions are secure, then every subsequent state will also be secure , no matter what inputs occur
Bell Lapadula Model basic security theorum
this model divides a system into a series of subjects and objects
bell lapadula model
a ____ is any entity that is attempting to access a system or date. it usually refers to an application or system that is attempting to access a system or data.
subject
4 clasification types
unclassified, classified, secret, top secret
this means that a subject can read an object only if the security level of the subject is higher that or equal to the security of the object
simple security property or ss property
a subject can write an object only if the security level of the object is higher than or equal to the security level of the subject.
- propert
this is an older model established in 1977. similar to bell lapadula and also uses subuect and objects. it controls object modification
Biba Integrity Model
this model comes in three parts. a subject cannot execute objects that have lower level of iegrity than the subject. a subject cannot modify objects that have a higher level of integrity. a subject may not request service that have a hgier integrity level.
Biba Integrity Modle
published in1987, like the Bel Alpadula model its a subject object model. it introduces programs.
clark wilson model
the 2 primary elements for achieving data integrity for this model is a well formed transaction and separation of duties.
clark wilson model