3.2 Sec Models, Frameworks Flashcards

1
Q

state machine model

A

ensures, that all instances of a subject accessing objects are secure. a system is always secure, no matter which state it is in. based on finite state machine and basis for many other security models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

information flow model

A
  • based on state machine model
  • designed to prevent unauthorized, insecure or restricted information flow, often between different levels of security

-> bell lapadula, biba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

noninterference model

A

prevents the actions of one subject (at a higher level) from affecting the system state or actions of another (lower) subject.

-> goguen-meseguer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

take-grant model

A

dictates, how rights can be passed from one subject to another or from a subject to an object.
A subject with a grant-right can grant another subject or object any other right they want.

take rule
grant rule
create rule
remove rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

access-control-matrix

A

each column is an ACL |
each row is a cababilities list —

ACLs are tied to the object (who is allowed to access this object)

capability lists are tied to the subject (lists every object this subject is allowed to access) -> management nightmare because every subject needs to be touched if general access to an object should be mitigated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

bell-lapadula

A
  • confidentiality only, based on information flow model, inverted biba
  • prevents leaking or transfer of classified information to less secure levels
  • no read up (Simple Security Property)
  • no write down * (Star Property)
  • requires classification level for all subjects and objects
  • enforces need to know
  • trusted subject is allowed to violate * (write down) to change classification levels
  • Strong tranquility property: labels will not change while system is operation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

biba

A
  • integrity only, based on information flow, inverted bell-lapadula
  • prevents subjects with lower security level from writing up
  • no read down (Simple Integrity)
  • no write up * (Star Integrity) / write down allowed
  • no trusted subject -> changing of classification levels impossible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

clark-wilson

A
  • integrity only, based on three-part-relationship

client interface resource

  • constrained interface (different functions/resources) related to security level
  • well formed transactions, separation of duties
  • a transaction procedure is allowed to modify a constrained data item. unconstrained data items are ignored
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

brewer and nash

chinese wall

A

access control changes dynamically to avoid conflict of interests.

Determines, which security domains are in conflict with the actual task and puts a wall around around all other information in a conflict class.

Uses data isolation to keep users out of potentional conflict-of-interest situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

goguen-meseguer

A

integrity-only, based on non-interference

domain separation, subjects are unable to interfere with their activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TCB

A

trusted computing base

TCP is the only portion of a system that can be trusted. Trusted base, that is separated from the rest of the system by a security perimeter and communicates with non-TCB components using trusted paths (secure channels)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reference monitor

A

security kernel in practice!
Part of TCB that stands between any subject and object, verifying that credentials meet the access requirements before any access is allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

certification

accreditation

A

technical evaluation if security standards are met

formal acceptance of certified configuration through senior management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCSEC (outdated)

red/orange book

A

guideline to evaluate IT from a security perspective

confidentiality only, no personnel or physical sec

A verified protection
B mandatory protection
C discretionary protection
D minimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ITSEC (outdated)

A

guideline to evaluate IT from a security perspective

full CIA
split into functionality and assurance (2-scale)
security (assurance is rated E0 minimal - E6 verified )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Common Criteria

A

guideline to rate/evaluate IT products from a security perspective

Target of Evaluation TOE
Protection profiles: What is wanted?
Security targets: what is built in TOE?

EAL: evaluation assurance levels:

EAL1 functionally tested (minimal)
EAL2 structurally tested (discretionary)
EAL3 methodically tested and checked (controlled access prot)
EAL4 methodically designed, tested and review (labeled)
EAL5 semi-formally designed and tested (structured)
EAL6 semi-formally verified, designed and tested (domains)
EAL7 formally verified, designed and tested (verified)

no evaluation of users, administrative issues, personnel, procedures, physical sec

17
Q

security kernel

A

implementation of the reference monitor in software and hardware

Part of TCB that stands between any subject and object, verifying that credentials meet the access requirements before any access is allowed. Uses trusted paths to communicate with subjects.

18
Q

OCTAVE

A

risk management framework from Carnegie Mellon U

phase 1: identify staff knowledge, assets and threats
phase 2: identify vulnerabilities and evaluate safeguards
phase 3: risk analysis and risk mitigation strategy

19
Q

COBIT subdomains

A

plan and organize
aquire and implement
deliver and support
monitor and evaluate

20
Q

CMMI model

Capability Maturity Model Intergation

A
  1. Initial (unpredictable, poorly controlled)
  2. Managed (reactive control)
  3. Defined (proactive control)
  4. Quantitatively Managed (measured and controlled)
  5. Defined (focused on process improvement)
21
Q

ISO

A

27001: ISMS (Management SYSTEM)
27002: info sec standards, practices for security management

22
Q

ITIL

A
Service Srategy
Service Design
Service Transition
Service Operation
Continual Service Improvement
23
Q

Lattice-based AC

A

lower and upper access limits are implemented for every relationship between subject and object. GITTER

position on lattice depends on the need of subject, label of object and role of subject

subjects have a least upper bound LUB and greatest lower bound GLB based on their lattice position