BLP and BIBA Flashcards

1
Q

what is Bell La Padula model

A

a security model used to enforce mandatory access controls for confidentiality in information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BLP - data classification model

A

> each subject or object is assigned to a security class
security classes form a strict hierarchy called security levels
e.g:
top secret > secret > confidential > unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BLP - security clearance

A

> subjects go through a background check
security clearance indicates their level of trustworthiness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BLP - security classification

A

> data (objects) are assigned classification level which indicates the level of sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BLP - 4 access modes

A

> read
append: write only (no read)
write: read+write
execute: neither read nor write, but may invoke object for execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BLP - partial ordering

A

(c1, d1)<=(c2,d2) IF (d1<=d2) AND (c1<=c2)
- c is clearance
- d is classification level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BLP - NO READ UP, NO WRITE DOWN, DS properties

A

> no read up property: a subject can only read an object of less or equal security level
no write down property: a subject can only write an object of greater or equal security level
discretionary property: a subject can exercise only accesses for which it has the necessary authorization and which satisfy the MAC rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the idea with discretionary properties

A

the idea is that site policy overrides discretionary access controls, so a user cannot give away data to unauthorized persons.
- basically you are an employee with your own key to your office, you can control who enters your office or even borrow the key
- but just because you can does not mean that is fully authorized, because your boss might have specific policies which will override your rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BLP formal description

A
  1. current state of system:
    > (b, M, f, H)
    > behavior, Matrix, function, Hierarchy
  2. current access set b
  3. access matrix M
  4. level function
  5. hierarchy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BLP - current access set b

A

set of triples {subject, object, access mode}
- set a is currently accessing object o in access mode a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BLP - access matrix M

A

Mij
- i = Si (rows)
- j = Oj (col)
- shows permitted access of Si to Oj

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BLP - level function f

A
  1. f0(Oj)
    - classification level of Object j
  2. fs(Si)
    - security clearance of subject Si = max security level of Si
  3. fc(Si)
    - current security classification level of Subject i
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BLP - hierarchy H

A

a directed rooted tree whose nodes are objects in the system. The security level of an object must dominate the security level of its parent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BLP - no read up formal description

A

(Si, Oj, read) has fc(Si)>=f0(Oj)
can only read an object of less or equal security level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BLP - no write down formal description

A

(Si, Oj, append) has fc(Si) <= F0(Oj)
can only write
(Si, Oj, write) has fc(Si)=F0(Oj)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BLP - discretionary formal description

A

(Si, Oj, Ax) implies Ax belongs in M{Si, Oj}

17
Q

BLP - when to characterize a system as secure

A
  • the current state of the system (b,M,f,H) is secure:
    IF AND ONLY IF: every element of b, satisfies the 3 BLP properties
18
Q

what is BIBA model

A

a computer security model that enforces integrity by preventing information flow from lower integrity levels to higher integrity levels, aiming to maintain data consistency and prevent unauthorized changes

19
Q

BLP VS BIBA

A

similarities:
- both use access control rules to determine access
- both assign security levels to subjects and objects
differences:
- BIBA addresses integrity
- BLP addresses confidentiality

20
Q

BIBA - what is integrity

A
  • integrity is usually defined in terms of preventing improper or authorized change to data
  • in BIBA, integrity refers to the trustworthiness of data or resources
21
Q

BIBA - model rules

A

information can only flow down
> higher levels are not allowed to read down
> lower levels are not allowed to write up

22
Q

BIBA - access modes

A

> modify: write or write info
observe: read info
execute: execute an object
invoke: communication from one object to another

23
Q

BIBA - integrity rules

A
  1. simple integrity:
    subject can only modify an object if its integrity is higher I(S)>=I(O)
  2. confinement integrity:
    subject can only read an object if its integrity is lower I(S)<=I(O)
  3. invocation integrity:
    subject S1 can only invoke another subject S2 if I(S1)>=I(S2)
24
Q

subject low watermark property

A

subject can read (observe) an object of any integrity level
> after the reading, the subject’s integrity is changed by using Inf(I(S),I(O))
> it uses subjects previous integrity level and objects current integrity level, and chooses the minimum of the both

25
Q

object low watermark property

A

subject can modify (write/update) an object of any integrity level
> after the modification, the object’s integrity is changed by using Inf(I(S),I(O))
> it uses object’s previous integrity level and subject’s current integrity level, and chooses the minimum of the both

26
Q

Discuss the relative ease with which a virus can spread through a system that implements mandatory access controls. Consider both the Bell-Lapadula model and the Biba model.
- Which model will have the greatest impact on the spread of a virus?
- How is the spread of a virus or worm on more common systems affected by the privileges with which the users run?
- What about the privileges with which servers run?

A

BLP
a. virus attached to a file at system low
> all labels dominate system log, so all users can read and execute the infected file
> on execute, the infected process will most likely run at the invoking users label and thus can spread to all other files at that label

b. virus attached to a file at system high
> propagation would be limited at system high
> the virus-infected file could only be read and executed by a process also running at a system high
> a process running at a system high cannot downgrade data, so only other system high-files have the possibility for infection

BIBA
a. virus attached to a file at low integrity
> the infection will be contained at low level integrity because subjects cannot modify higher integrity objects
> so the infection will only spread to other system low integrity data

b. virus attached to a file at high integrity
> all users can read/execute the high integrity file
> so infected file will be available to processes running at low level integrity
> that process can propagate its data to other files at its level