Chapter 5: Security Architecture and Design Flashcards
Trusted Computing Base (TCB)
The totality of protection mechanisms pertaining to a computer system, including hardware, firmware, and software; enforces a unified security policy
Subject:
User or device
Object:
resource, data, etc
Reference monitor is…
a software model or abstract machine that mediates all accesses
Reference monitor should be…
Complete, for all accesses
Isolated from modification by other systems
Verifiable in doing what it’s supposed to and without outside interference
Security Kernel
a reference monitor for a specific hardware base
Mandatory Access Control (MAC)
For environments where there is no single information owner. Awards access to objects based on labels and clearance levels. Reference monitor is the decision maker.
Rings of Trust
Model depicting the shrinking rings of individuals with need to know/proper clearance to access more secret or secure objects. Model can be used at the hardware level, such as in the case of a CPU kernel mediating data access
Rules for Rings of Trust within network
Each rings trusts all rings closer to center than it
No host trusts any host in a further out ring
Segments in same ring are not automatically trusts though are “allowed” to depending on function
Primary Storage
The memory storage allotted to the CPU for active work; volatile and info disappears when power is lost
Secondary Storage
Nonvolatile storage that can store application or system code when system is not in use. Flash drives, USB sticks, tapes, etc
Real memory
Storage location for a program in memory and direct access to peripheral device
Virtual memory
Extends volume of primary memory storage; swapped in and out of primary when processing power is needed
Random memory
Computer’s primary working and storage area; directly addressable by CPU and can store application or system code as well as data
Sequential memory
Memory such as a magnetic tape
Volatile memory
Any memory that loses all info upon power loss
Closed system
Proprietary and limited in nature and options
Open system
Guided by standards that allow new or nicer components to react inside the system under operational safeguards; allows user access to basically whole system
Finite State machine
Machine “remembers” certain states that it can move between
TCSEC
Prioritizes confidentiality, utilizes TCB of hardware and software; breaks down recommendations/requirements/TCB by divisions A, B, C, D
TCSEC: Division D, Minimal Protection
Minimal protection: unrated, untested, or insufficient systems
TCSEC: Division C, Discretionary Protection
Information owners get to dictate who gets to access the material
TCSEC: Division C, C1
Discretionary Security Protection; for workgroups, etc. Prevents accidental reading or writing outside the discretioned group, but controlled by the people inside that group, not an outside entity
TCSEC: Division C, C2
Controlled access protection; more thorough, requires individual logons and user logging to enforce accountability for access and changes, and has resource segmentation