Ch8 Flashcards

1
Q

all instances of subjects accessing objects are secure

A

state machine model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

designed to prevent unauthorized, insecure, or restricted information flow

A

information flow model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

prevents the actions of one subject from affecting the system state or actions of another subject

A

noninterference model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

dictates how rights can be passed from one subject to another or from a subject to an object

A

Take-Grant model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

table of subjects and objects that indicates the actions or functions that each subject can perform on each object

A

access control matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

subjects have a clearance level that allows them to access only those objects with the corresponding classification levels; enforces Confidentiality

A

Bell-Lapadula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

prevents subjects with lower security levels from writing to objects at higher security levels

A

Biba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

relies on auditing to ensure that unauthorized subjects cannot access objects and that authorized users can access objects properly

A

Clark-Wilson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access Triple

A

3 parts of Clark-Wilson model include: subject, object & program (interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what models enforce integrity

A

Biba & Clark-Wilson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what model focuses on integrity

A

Goguen-Meseguer & Sutherland

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what model focuses on secure creation and deletion of both subjects and objects

A

Graham-Denning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what models are built on the state machine model

A

Biba & Bell-Lapadula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the only model to address confidentiality

A

Bell-Lapadula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what model prevents conflicts of interest

A

Brewer & Nash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the 3 types of composition theories

A

Cascading
Feedback
Hookup

17
Q

Input for one system comes from the output of another system

A

Cascading composition theory

18
Q

One system provides input to another system, which reciprocates by reversing those roles

A

Feedback composition theory

19
Q

One system sends input to another system but also sends input to external entities

A

Hookup composition theory

20
Q

the mode a process runs in when it is confined through the use of memory bounds.

21
Q

restricts a process to reading from and writing to certain memory locations

A

Confinement

22
Q

are the limits of memory a process cannot exceed when reading or writing

23
Q

combination of hardware, software, and controls that form a base that enforces the security policy

A

TCB Trusted Computing Base

24
Q

imaginary boundary that separates the TCB from the rest of the system. TCB components communicate with non-TCB components using trusted paths.

A

security perimeter

25
Q

logical part of the TCB that confirms whether a subject has the right to use a resource prior to granting access.

A

Reference Monitor

26
Q

collection of the TCB components that implement the functionality of the reference monitor

A

security kernel

27
Q

core security component that must be designed and implemented
into an operating system. used to prevent an active process from interacting with an area of memory that was not specifcally assigned or allocated to it

A

memory protection

28
Q

both a specification for a cryptoprocessor chip on a mainboard and the general name for implementation of the specification. used to store and process cryptographic keys for the purposes of a hardware supported/implemented hard drive encryption system

A

Trusted Platform Module TPM