3-20.1 Flashcards

1
Q

Name some foundational infosec models

A

State machine, Non-Interference, Informational Flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name some Relationship, or higher level, models

A

Bell-LaPadula, Biba, Clark Wilson, Graham Denning, and Brewer/Nash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a state model?

A

Foundational model that ensures no matter what activity is taking place within a system, it is always trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a non-interference model?

A

Dictates that whatever happens at one security level doesn’t not directly or indirectly affect the security model of other levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the information flow model?

A

Focuses on controlling the information flow and ensuring it does not violate te security policy. Allows and prevents based on authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the interactions between subject and objects in information security?

A

Subjects cause information to flow or change system state. Objects are passive entities that contain or receive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Bell-Padula?

A

Objective is confidentiality. No Read up, no write down. Simple Rule: Objects cannot read data whose classification is higher than their clearance. Subjects cannot write to an object at a lower classification than their clearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is BIBA?

A

Objective is integrity (No read down - no write up). Simple Rule: Subjects cannot read data that has a lower classification than their clearance. Star Rule: Subjects cannot write to an object at a higher classification than their clearance level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Clark-Wilson?

A

Objective is integrity. Well-formed transactions ensure that a user cannot alter data arbitrarily. Data can only be altered in a specific way in order to preserve it internal consistency (access triple).
→ Prevent unauthorized users from making modifications.
→ Prevent unauthorized users from making improper modifications.
→ Maintain internal and external consistency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Sutherland?

A

Sutherland: Objective is integrity
→ Focuses on preventing interference.
Used to prevent a covert channel from being used to exploit a process or activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Brewer/Nash?

A

Objective is to defend against conflicts of interest.
→ Conflict of interest categories must be defined.
→ Access controls change dynamically depending upon a user’s previous action. Model is used in contexts where preventing conflicts of interest is critical, such as financial or legal environments. It provides a practical approach to controlling information flow and access based on the principle of maintaining separation between conflicting interests within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly