Chapter 5: Security Architecture and Design Flashcards

1
Q

Trusted Computing Base (TCB)

A

The totality of protection mechanisms pertaining to a computer system, including hardware, firmware, and software; enforces a unified security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Subject:

A

User or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Object:

A

resource, data, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reference monitor is…

A

a software model or abstract machine that mediates all accesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reference monitor should be…

A

Complete, for all accesses
Isolated from modification by other systems
Verifiable in doing what it’s supposed to and without outside interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Kernel

A

a reference monitor for a specific hardware base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mandatory Access Control (MAC)

A

For environments where there is no single information owner. Awards access to objects based on labels and clearance levels. Reference monitor is the decision maker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rings of Trust

A

Model depicting the shrinking rings of individuals with need to know/proper clearance to access more secret or secure objects. Model can be used at the hardware level, such as in the case of a CPU kernel mediating data access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rules for Rings of Trust within network

A

Each rings trusts all rings closer to center than it
No host trusts any host in a further out ring
Segments in same ring are not automatically trusts though are “allowed” to depending on function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Primary Storage

A

The memory storage allotted to the CPU for active work; volatile and info disappears when power is lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secondary Storage

A

Nonvolatile storage that can store application or system code when system is not in use. Flash drives, USB sticks, tapes, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Real memory

A

Storage location for a program in memory and direct access to peripheral device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual memory

A

Extends volume of primary memory storage; swapped in and out of primary when processing power is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Random memory

A

Computer’s primary working and storage area; directly addressable by CPU and can store application or system code as well as data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sequential memory

A

Memory such as a magnetic tape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Volatile memory

A

Any memory that loses all info upon power loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Closed system

A

Proprietary and limited in nature and options

18
Q

Open system

A

Guided by standards that allow new or nicer components to react inside the system under operational safeguards; allows user access to basically whole system

19
Q

Finite State machine

A

Machine “remembers” certain states that it can move between

20
Q

TCSEC

A

Prioritizes confidentiality, utilizes TCB of hardware and software; breaks down recommendations/requirements/TCB by divisions A, B, C, D

21
Q

TCSEC: Division D, Minimal Protection

A

Minimal protection: unrated, untested, or insufficient systems

22
Q

TCSEC: Division C, Discretionary Protection

A

Information owners get to dictate who gets to access the material

23
Q

TCSEC: Division C, C1

A

Discretionary Security Protection; for workgroups, etc. Prevents accidental reading or writing outside the discretioned group, but controlled by the people inside that group, not an outside entity

24
Q

TCSEC: Division C, C2

A

Controlled access protection; more thorough, requires individual logons and user logging to enforce accountability for access and changes, and has resource segmentation

25
Q

TCSEC: Division B: Mandatory Protection

A

TCB enforces a label system (such as classification markings). Requires reference monitor architecture

26
Q

TCSEC: Division B: B1

A

Labeled Security Protection; more informal policies, still contains labels, subjects and object in its operational make up. May not encompass every component of the system

27
Q

TCSEC: Division B: B2

A

Structured Protection: TCB is clearly defined and operates according to strict formal policy, and the entire system must operate according to those policies. Tested to ensure there are no unintended communications in the system

28
Q

TCSEC: Division B: B3

A

Security Domains: reference monitor MUST mediate all accesses of subjects to objects, resist tampering, be small enough to be testable and analyzed completely.

29
Q

TCSEC: Division A: Verified Design

A

Formal security verification methods to ensure processes are working correctly; requires extensive documentation to demonstrate proper process has been followed since the beginning to ensure the system is as resistant as possible

30
Q

TCSEC: Division A: A1

A

Architecture remains the same, but the assurances during planning and designing are more exhausting.

31
Q

Trusted Network Interpretation (TNI)

A

Takes the principles of TCSEC and renders it into networked environments

32
Q

Information Technology Security Evaluation Criteria (ITSEC)

A

European counterpart to TCSEC. Similar, but contains additional components such as system profiles and assurance and functionality classes

33
Q

Common Criteria

A

Unified security standard that brought all of the various expectations and requirements together and provided for international cross compatibility; became ISO International Standard 15408

34
Q

Bell Lapadula Model

A

Basis of TCSEC; it’s a formal policy that describes a set of access controls. This is the model that mediates access to classified material via matching clearance and classification. A confidentiality model that preserves principle of least privilege and defines access paths

35
Q

Biba Model

A

Integrity model that prevents users from making unallowed changes to data. Utilizes “read up-write down” to prevent lower quality or less controlled data from contaminating more secure data

36
Q

Target of Evaluation (TOE)

A

The device or system to be reviewed for CC certification.

37
Q

Protection Profile (PP)

A

Template used to define a standard set of security requirements for a particular class of related products. A protection profile serves as a reusable template of security requirements. Depending on the Target of Evaluation, multiple profiles may be used at once.

38
Q

Security Target (ST)

A

Explicitly stated set of requirements specific to the capabilities of the product under evaluation.

39
Q

Security Functional Requirements (SFRs)

A

Security requirements that refer to unique security functions provided by a product.

40
Q

Evaluation Assurance Levels (EAL)

A

Used to define the way the product is tested and how thoroughly. These levels are scaled from 1 to 7, with 7 being the highest level and 1 the lowest. A higher number does not necessarily mean that the product went through more rigorous testing.