Chapter 8 Flashcards

1
Q

Transitive trust

A

If A trusts B, B trusts C, A inherits trust in C

  • Serious security concern
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CISSP secure design principles

A
  1. Defense in depth
  2. Zero trust
  3. Secure defaults
  4. Fail securely
  5. Keep it simple
  6. Privacy by design
  7. Trust but verify (no longer sufficient - need 0-trust)
  8. Least privilege
  9. Separation of duties
  10. Threat modeling
  11. Shared responsibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privacy by Design

A

7 Principles:
- Proactive not reactive, preventive not remedial
- Privacy as default
- Privacy embedded into design
- Full functionality; positve sum not zero sum
- End to end security
- Visibility and transparency
- Respect for user privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SASE (Secure Access Service Edge)

A
  • identity-centric as opposed to perimeter-based security model
  • cloud-native architecture
  • zero-trust network access
  • leverages edge computing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Techniques for ensuring CIA

A

Confinement - sandboxing; only rd/wr to certain memory locations and resources

Bounds - e.g. limit area of memory for process to access; resources that can be accessed, etc.

Isolation - processes cannot interfere with each other; enforcement of bounds

Access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trusted system

A

System that is able to handle sensitive data securely and is stable and secure env

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Assurance

A

How well security mechanisms satisfy security requirements/needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trusted Computing Base (TCB)

A
  • only portion of the system that is trusted and adheres to security policy
  • security perimeter around TCB; communicate via trusted paths through the security perimeter; may allow use of trusted shell
  • reference monitor controls access to TCB; security kernel is reference monitor; security kernel is part of TCB
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access Control Matrix

A
  • Rows: subjects
  • Cols: objects
  • Each cell is an ACL
  • Entire row is a capabilities list for each subject
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of data security model

A

State machine model - secure state transition to another secure state based on input

Information flow model - focus on flow of info; control direction or type of info

Non-interference model - activity at lower level cannot interfere with higher level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Take-Grant Model

A
  • directed graph of take/grant/rights of subjects over objects

4 rules:
1. Take rule - subj take (inherit) rights over obj from another subj
2. Grant rule - subj grant rights over obj to another subj
3. Create rule
4. Remove rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bell-LaPadula

A
  • State machine, information flow
  • Mandatory and lattice based access control
  • Confidentiality

Rules:
1. Simple security property - no read up
2. Star security property - no write down
3. Discretionary security property - discretionary access control via access matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Biba model

A
  • State machine, informational flow
  • Integrity

Rules:
1. Simple integrity property - no read down
2. Star integrity property - no write up
3. Invocation property - cannot send access requests to higher level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Clark Wilson Model

A
  • Uses access control triplet (subj/trans/obj)
  • Restricted interface model
  • No direct access to objects
  • Integrity

CDI - constrained data item
UDI - unconstrained data item
IVP - integrity verification process
TP - transformation process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Brewer Nash

A

Focus on Conflicts of Interest; access changes based on previous activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Goguen-Meseguer

A

Based on non-interference model

17
Q

Graham-Denning

A

Focus on secure creation/deletion subjects and objects

18
Q

Common Criteria

A
  1. Target of Evaluation (TOE) - the product
  2. Protection Profiles (PP) - what customer wants
  3. Security Targets (ST) - what vendor will provide

7 EAL’s (Evaluation Assurance Levels):
EAL 1 - Functionally tested
EAL 2 - Structurally tested
EAL 3 - Methodically tested and checked
EAL 4 - Methodically designed, tested and reviewed
EAL 5 - Semi-formally designed and tested
EAL 6 - Semi-formally verified, designed and tested
EAL 7 - Formally verified, designed and tested

19
Q

Authorization to Operate (ATO)

A
  • issued by AO (Authorizing Official)
  • ATO is 5 years then renewed; or if breach or there is change

CCA - common control authorization; inherited from another provider
ATU - auth to use; in case of service provider

20
Q

Information system life cycle

A
  • Stakeholders’ Needs and Requirements
  • Requirements Analysis
  • Architectural Design
  • Development / Implementation
  • Integration
  • Verification and Validation
  • Transition/Deployment
  • Operations and Maintenance/Sustainment
    Retirement/Disposal