arch Flashcards
Control Unit
Control Unit
Fetches code, interprets code, oversees exe.
Trusted Computing Base
Trusted Computing Base (TCB)
consists of sw, hw, fw, and processes wi a comp that are designed to enfore a sec pol.
Common Criteria
Common Criteria
works to answer 2 basic Qs: What sec mech wi the product do? How sure of it are you?
Certifications
Certifications
technial review of prod that ensure sec req have been met.Certs are preformed 1st and then Accrediations.
Invocation prop
Invocation property
part of biba security model and enforces integrity btw subj and obj
*-property rule
Part of Bell-Lapadula model and enforces confidentiality.
Simple security role
a subject cannot read data within object that resides in a higher security level. “No read up “rule
Strong star property rule
For a subject to be able to read and write to an object the subjects clearance any objects classification must be equal
orange book/ TCSEC levels
A. verified protection
B. Mandatory
C: Discretionary
D: minimal
B2 offers more assurance then B1
ITSEC (euro) has 2 grades:
F1-F10 = functional
E0-E6 = assurance
0 being worst.
.
Common criteria is the evaluation identified by ISO and 93 that outlines any merges all of their evaluation criteria such as TCsec and ITsec and CTCPEC
Eval1- Eval7.
7 bring best and formally verified design and tested
1: Functionally tested
2: Structurally tested
3: Methodically we tested and checked
4: Methodically designed tested and reviewed
5: Semi formally designed and tested
6: semi formally verified design and tested
7: Formally verified design and tested
Which security model dictate that subjects can only access objects your application. This model also illustrates how to provide functionality for separation duties and requires auditing tasks within software
The Clark – Wilson model
Which security model is used mainly military and government oriented systems
The bell– LaPadula model
Which security models are used in the commercial sector
The Biba and Clark – Wilson model
the deal with C-language and buffer overflow attacks
The ceiling which is susceptible to buffer overflow attacks because it allows for direct pointer manipulations to take place. Specific commands can provide access to low-level memory addresses without carrying bounds checking