CH 4 Host Security Flashcards
Access Control List (ACL)
..Work from the top down
. Implicit deny clause at the end
Host-based firewalls
.Adds defense-in-depth by creating another layer of controls
.Inspects and controls inbound and outbound traffic from host where installed
Persistent Agents
.Always on.
.Performs compliance and authentication before allow system to have network access.
Non-persistent agents
.Do not run continuously.
.Check the systems and terminate the process
Trusted Operation System
.One that has implemented sufficient controls to support multilevel security
.Can handle information at different security levels
Common Criteria
. Examines different areas (physical, logical) of the trusted OS to establish an evaluation assurance level (EAL).
EAL 0: Inadequate assurance
EAL 1: Functionally tested
EAL 2: Structurally tested
EAL 3: Methodically checked and tested
EAL 4: Methodically designed, tested and reviewed
EAL 5: Semi-formally designed and tested
EAL 6: Semi-formally verified, designed, and tested
EAL 7: Formally verified, designed and tested
Trusted OS Basic Attributes
. Hardware protection - secure HW
. Long-term storage protection - storage protection that lasts across power cycles and other events
. Isolation - Able to isolate programs
. Separation of User Processes from Supervisor Processes
Trusted Computer Base
.The sum of all the protections mechanisms withing a computer
. Is responsible for enforcing computer policies
. HW, SW, controls process.
Bell-LaPadula Security Model
. Confidentiality is the primary focus
. Subject must clear and meet or exceed the information classification level
> Simple Security
. NO READ UP - not allow to read information at a higher classification level
> Star
. NO WRITE DOWN - a subject at one information level is not allows to write information to a lower level of confidentiality
> Strong Star Security - subject cannot write up or read down.
Biba Security Model
. Integrity is the primary focus
> Simple Integrity
. NO READ DOWN - subject at one level of integrity is not permitted to read as object of lower integrity
> Start Integrity - an object at one level of integrity is not permitted to write to an object of higher integrity.
> Invocation - prohibits a subject at one level from invoking a subject at a higher level of integrity
Clark - Wilson Security Model
. Capability-based security
. Data can only be manipulated in a way that protects consistency
Brewer- Nash
.Chinese wall
.Designed to prevent conflicts of interest.
Subject working one one side of the wall cannot see data on the other side of the wall.
Clearances
Government: Top Secret - Secret - Unclassified
Private: Restricted - Private - Public
Least Functionality Control
Organization configures the IS to provide only essential capabilities and specifically prohibits and /or restricts the use of these functions to certain users.
Incremental Attacks
. Goal is to make changes slowly over a long period of time in hopes of remaining undetected.
> Data Diddling- small changes to databases
> Salami Attack - small changes to financial records