31. Security Models and Concepts - 1 Flashcards

1
Q

Security Models and Concepts - 1

Bell-LaPadula
(Confidentiality)

A

Mandatory Access Control
Only focused on confidentiality

  1. Simple Security Property
  2. Security Property
  3. Strong Property

  • Devloped by US department of defence
  • Does not care about integrity or availability
    *
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Models and Concepts - 1

Bell-LaPadula:
Simple Securtiy Property

A

“cannot read up”

  • Someone with secret clearance cannot read top secret documents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Models and Concepts - 1

Bell-LaPadula:
Security property

A

“No write down”

  • Subjects with top secret clearance cannot write top secret information to secret folders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Models and Concepts - 1

Bell-LaPadula:
Strong Property

A

“No read or write up and down”

  • Subjects can only access data on their own level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Models and Concepts - 1

BIBA
(Integrity)

A

Mandatory Access Control

  1. Simple Integrity Axiom
  2. Integrity Axiom
  3. Invocation Property

  • Does not care about confidentiality or availability
  • Developed by US department of defence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Models and Concepts - 1

BIBA:
Simple Integrity Axiom

A

“No read down”

  • People with top secret clearance cannot read secret information
  • Not that we care they can see lower level information, but want to avoid confusion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Models and Concepts - 1

BIBA:
Integrity Axiom

A

“no write up”

  • Secret clearance cannot write information to top secret level folders
  • Do not want inferior knowledge to influence or propagate to higher levels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Models and Concepts - 1

BIBA:
Invocation Property

A

“no read or write up”

  • Do not want people from lower tiers to influence higher tier information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Models and Concepts - 1

Lattice Based Access Control
(LBAC)

A

Mandatory Access Control

  • May be referred to as the label based access control
  • Subjects can have multiple access rights
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Models and Concepts - 1

Graham-Denning Model

A

Uses Objects, Subjects, and Rules
8 rules subject can execute

  • Commonly used in distributed system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Models and Concepts - 1

Graham-Denning Model:
Transfer Access

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Models and Concepts - 1

Graham-Denning Model:
Grant access

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Models and Concepts - 1

Graham-Denning Model:
Delete Access

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Models and Concepts - 1

Graham-Denning Model:
Read Object

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Models and Concepts - 1

Graham-Denning Model:
Create Object

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Models and Concepts - 1

Graham-Denning Model:
Destroy Object

A
17
Q

Security Models and Concepts - 1

Graham-Denning Model:
Create Subject

A
18
Q

Security Models and Concepts - 1

Graham-Denning Model:
Destroy Subject

A
19
Q

Security Models and Concepts - 1

Harrison, Ruzzo, Ullman model
(HRU)

A

Operating system level computer security model
6 primitive operations

  • Integrity of acces rights in the system
  • Extension of the graham-denning model
  • Finite set of procedures availabel to edit access rights of a subject on an object
  • Subjects are considered to be objects
20
Q

Security Models and Concepts - 1

HRU:
Create Object

A
21
Q

Security Models and Concepts - 1

HRU:
Create Subject

A
22
Q

Security Models and Concepts - 1

HRU:
Destroy Subject

A
23
Q

Security Models and Concepts - 1

HRU:
Destroy Object

A
24
Q

Security Models and Concepts - 1

HRU:
Enter right into access matrix

A
25
Q

Security Models and Concepts - 1

HRU:
Delete right from access matrix

A