32. Security Models and Concepts - 2 Flashcards

1
Q

Security Models and Concepts - 2

Clark-Wilson
(Integrity)

A

Separates end users from back-end data

  • Uses well formed transactions
  • Separation of duties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Models and Concepts - 2

Clark-Wilson:
Subject/Program/Object

A

Program between subject and object

  • example, person buying something on amazon
  • user cannot change how many books are available
  • A user can add item to the cart and purchase, amazon program subjects 1 from the inventory once an item is purchased
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Models and Concepts - 2

Clark-Wilson:
Separation of duties

A

Certifier of transaction and implementer
i.e. person making purchase orders should not be paying invoices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Models and Concepts - 2

Clark-Wilson:
Well formed transactions

A

Series of operations
Transition a system from one consistent state to another consistent state

  • Integrity - when you purchase an item from amazon, if they have 1000 in stock and you buy one, it should change to 999 in stock and wait for the next customer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Models and Concepts - 2

Brewer-Nash Model
(Chinese Wall or Information Barrier)

A

Controls that mitigate conflict of interest

  • No information can flow between the subjects and objects in a way that would create conflict of interest
  • Commercial organisations
    *
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Models and Concepts - 2

Non-Interference Model

A

Actions at a higher securtiy level do not interefer with actiosn at a lower level

  • model not cocerned with data flow
  • Concerned with what subject knows about the state of the system
  • Changes made at a higher level should nto be noticed by someone with access at a lower level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Models and Concepts - 2

Take-Grant Protection Model

Take-Grant Model

Thor can take (T) Hanes rights for the object
Jane can Create (C) and Remove (R) rights for the object
Jame can Grant (G) any of her rights to Bob

A

Rules govern interactions between subjects and objects

  • uses permissions that subjects can grant to (or take from) other subjects
  • 4 rules
    *
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Models and Concepts - 2

Take-Grant Protection Model:
Take

Take-Grant Model

Thor can take (T) Hanes rights for the object
Jane can Create (C) and Remove (R) rights for the object
Jame can Grant (G) any of her rights to Bob

A

Rule allows subject to take rights over an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Models and Concepts - 2

Take-Grant Protection Model:
Grant

Take-Grant Model

Thor can take (T) Hanes rights for the object
Jane can Create (C) and Remove (R) rights for the object
Jame can Grant (G) any of her rights to Bob

A

Rule allows a subject to grant the rights they have to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Models and Concepts - 2

Take-Grant Protection Model:
Create

Take-Grant Model

Thor can take (T) Hanes rights for the object
Jane can Create (C) and Remove (R) rights for the object
Jame can Grant (G) any of her rights to Bob

A

Rule allows a subject to create rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Models and Concepts - 2

Take-Grant Protection Model:
Remove

Take-Grant Model

Thor can take (T) Hanes rights for the object
Jane can Create (C) and Remove (R) rights for the object
Jame can Grant (G) any of her rights to Bob

A

Rule allows a subject to remove the rights they have over an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Models and Concepts - 2

Access Control Matrix

A

Describes rights of every subject for every object in the system

  • Like an excel spreadsheet
  • One row per subject
  • One column per object
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Models and Concepts - 2

Zachman Framework
(Enterprise Architecture)

A

6 Frameworks;

  1. What
  2. How
  3. Where
  4. Who
  5. When
  6. Why

  • Maps frameworsk to rules
    1. Planner
    2. Owner
    3. Designer
    4. Builder
    5. Programmer
    6. user
  • Need to understand the different roles, their needs so you can give them what they need when they need it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Models and Concepts - 2

Security Modes

A

Can be MAC and DAC

  • Mandatory or Discretionary Access Control
  • Systems have different levels of classification. The mode we chose to impelement will be determined by the users who directly or indirectly try to access them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Models and Concepts - 2

Mode Determination

A

Determined by;
1. Type of user accessing the system
2. Type of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Models and Concepts - 2

Security Modes:
Dedicated Security Mode

A

All users must have:

  1. Signed NDA for ALL information on the system
  2. Proper clearance for ALL information on the system
  3. Formal access approval for ALL information on the system
  4. A valid need to know for ALL information on the system
  5. All users can access ALL data

  • Everyone accessing a system has a need to know, and signed the NDA, then they can have access to everything on that system
17
Q

Security Models and Concepts - 2

Security Modes:
System High Security Mode

A

All users must have:

  1. Signed NDA for ALL information on the system
  2. Proper clearance for ALL information on the system
  3. Formal access approval for ALL information on the system
  4. A valida need to know for SOME information on the system
  5. All users can access SOME data, based on their need to know
18
Q

Security Models and Concepts - 2

Security Modes:
Compartmented Security Mode

A

All users must have:

  1. Signed NDA for ALL information on teh system
  2. Proper clearance for ALL information on the system
  3. Formal access approval for SOME information they will access on the system
  4. A valid need to know for SOME information on the system
  5. All users can access SOME data, based on their need to know and formal access approval
19
Q

Security Models and Concepts - 2

Security Modes:
Multilevel Security Mode
(Controlled Security Mode)

A

All users must have:

  1. Signed NDA for ALL information on the system
  2. Proper clearance for SOME information on the system
  3. Formal access approval for SOME information they will access on the system
  4. A valid need to know for SOME information on the system
  5. All users can access SOME data, based on their need to know and formal access approval
20
Q

Security Models and Concepts - 2

A