3. Security Engineering Flashcards
Define TCB
Trusted computer base
Define Security perimeter
Delineates the trusted and untreated components of a computer system
Define reference monitor
An abstract machine concept that mediates all access between subjects and objects
What are the two execution types?
Cooperative multitasking- does not allow for individual or isolation process.
Pre-emptive multitasking - allowed for true isolation of resources. Each task runs on its own space and processor time.
What are the two CPU modes?
User state - (Problem Mode) - processor operates in reduced access to resources.
Privileged (kernel mode) - processor operates in ring 0, which has the highest level of trust.
What are the three security models?
- Bell-LaPadula
- BIBA
- Clark-Wilson
Basics of Bell-LaPadula
- Subject cannot read data from a security level higher then its own.
- Subject cannot write down to a security level lower then its own.
No read up, no write down.
Basics of BIBA
- Designed to protect integrity of knowledge base.
- Subject cannot read data from object of lower level.
- Subject cannot write to an object with a higher level.
- A subject cannot call upon a subject at a higher level.
Basics of Clark-Wilson
- Separation of duties
- Enforces well-formed transitions by using the access triple: User>transformation procedure>Constained Data Item
- Stops unauthorized users from making changes
- Stops authorized users from making improper changes
- Maintain internal and external consistency.
Define Discretionary Access Control
Security of object is at owners control.
Access granted through ACL
Identity based.
Define Mandatory Access Control
OS makes decision based on a security label system.
Data owners CANNOT grant access
Subjects label must dominate the objects level.
User and data given clearance level.
What are the four common architectures?
- Distributed computing
- Service Oriented Architecture
- Internet rich apps
- Ubiquitous computing - wireless networking
What are the services provided by cryptography
PAIN
Privacy: prevents unauthorized disclosure
Authenticity: verifies the claimed identity
Integrity: detects modification or corruption
Non-Repudiation: combines authorization and integrity. User cannot dispute having sent a message.
What are some examples of symmetric cryptography?
Stream, RC-4, Block, AES/3DES
What are other names for symmetric cryptography?
Private, shared key, secret.