Chapter 5: Security Architecture and Design Flashcards
Trusted Computing Base (TCB)
The totality of protection mechanisms pertaining to a computer system, including hardware, firmware, and software; enforces a unified security policy
Subject:
User or device
Object:
resource, data, etc
Reference monitor is…
a software model or abstract machine that mediates all accesses
Reference monitor should be…
Complete, for all accesses
Isolated from modification by other systems
Verifiable in doing what it’s supposed to and without outside interference
Security Kernel
a reference monitor for a specific hardware base
Mandatory Access Control (MAC)
For environments where there is no single information owner. Awards access to objects based on labels and clearance levels. Reference monitor is the decision maker.
Rings of Trust
Model depicting the shrinking rings of individuals with need to know/proper clearance to access more secret or secure objects. Model can be used at the hardware level, such as in the case of a CPU kernel mediating data access
Rules for Rings of Trust within network
Each rings trusts all rings closer to center than it
No host trusts any host in a further out ring
Segments in same ring are not automatically trusts though are “allowed” to depending on function
Primary Storage
The memory storage allotted to the CPU for active work; volatile and info disappears when power is lost
Secondary Storage
Nonvolatile storage that can store application or system code when system is not in use. Flash drives, USB sticks, tapes, etc
Real memory
Storage location for a program in memory and direct access to peripheral device
Virtual memory
Extends volume of primary memory storage; swapped in and out of primary when processing power is needed
Random memory
Computer’s primary working and storage area; directly addressable by CPU and can store application or system code as well as data
Sequential memory
Memory such as a magnetic tape
Volatile memory
Any memory that loses all info upon power loss