Chapter 8 Principles of Security Models, Design, and Capabilities Flashcards
The user or process that makes a request to access a resource is called a _____.
subject
The ____ is the resource a user or process wants to access.
object
______ is the concept that if A trusts B and B trusts C, then A inherits trust of C
Transitive trust
A ________ is designed to work well with a narrow range of other systems, generally all from the same manufacturer.
closed system
_______ allows a process to read from and write to only certain memory locations and resources.
Confinement
Bounds
Isolation
Controls
confinement
The ____ of a process consist of limits set on the memory addresses and resources it can access.
Confinement
Bounds
Isolation
Controls
bounds
______ ensures that any behavior will affect only the memory and resources associated with the isolated process
Confinement
Bounds
Isolation
Controls
isolation
A ___ uses access rules to limit the access of a subject to an object.
Confinement
Bounds
Isolation
Controls
control
type of attribute storage is called a _____, which is generally a permanent part of the object to which it’s attached.
Tokens
Capabilities
Labels
Labels
A ____ list
maintains a row of security attributes for each controlled object. Although not as fl exible as the token approach, capabilities lists generally offer quicker lookups when a subject requests access to an object.
Tokens
Capabilities
Labels
capabilities
A ___ can communicate security information about
an object prior to requesting access to the actual object
Tokens
Capabilities
Labels
token
A combination of
hardware, software, and controls that work together to form a trusted base to enforce
your security policy.
trusted computing base
A ________ is a channel established with
strict standards to allow necessary communication to occur without exposing the TCB to security vulnerabilities.
trusted path
________ stands between every subject and object, verifying that a requesting subject’s credentials
meet the object’s access requirements before any requests are allowed to proceed.
Reference Monitors
The collection of components in the TCB that work together to implement reference monitor functions
security kernel
The ____ is a concept or theory that is put into practice via the implementation of a security kernel in software
and hardware.
reference monitor
a system that is always secure no matter what state it is in.
state machine model
What is a secure state
machine .
each possible
state transition results in another secure state,
_____ is concerned with preventing information flow from a high security level to a low security level.
Bell-LaPadula
Biba
Bell-LaPadula
___ is concerned with preventing information fl ow from a low security level to a
high security level.
Bell-LaPadula
Biba
Biba
The _______ is concerned with how the actions of a subject at a higher security level affect the system state or the actions of a subject at a lower security level.
noninterference model
What type of model follows how information flows between systems rather than within an individual system.
composition theories
_____ theories because they explain how outputs from one system relate to inputs to another system.
composition