Chapter 8– Principles of Security Models, Design, and Capabilities Flashcards
- What is system certification?
A technical evaluation of each part of a computer system to assess its compliance with security standards
A technical evaluation of each part of a computer system to assess its compliance with security standards
A system certification is a technical evaluation. Option A describes system accreditation. Options C and D refer to manufacturer standards, not implementation standards.
- What is a system accreditation?
Formal acceptance of stated system configuration
Formal acceptance of stated system configuration
Accreditation is the formal acceptance process. Option B is not an appropriate answer because it addresses manufacturer standards. Options C and D are incorrect because there is no way to prove that a configuration enforces a security policy and accreditation does not entail secure communication specification.
- What is a closed system?
A proprietary system that uses unpublished protocols
A proprietary system that uses unpublished protocols
A closed system is one that uses largely proprietary or unpublished protocols and standards. Options A and D do not describe any particular systems, and Option B describes an open system.
- Which best describes a confined or constrained process?
A process that can access only certain memory locations
A process that can access only certain memory locations
A constrained process is one that can access only certain memory locations. Options A, B, and D do not describe a constrained process.
- What is an access object?
A resource a user or process wants to assess
A resource a user or process wants to assess
An object is a resource a user or process wants to access. Option A describes an access object.
- What is a security control?
A mechanism that limits access to an object
A mechanism that limits access to an object
A control limits access to an object to protect it from misuse by unauthorized users.
- For what type of information system security accreditation are the applications and systems at a specific, self-contained location evaluated?
Site accreditation
Site accreditation
The applications and systems at a specific, self-contained location are evaluated for DITSCAP and NIACAP site accreditation.
- How many major categories do the TCSEC criteria define?
Four
Four
TCSEC defines four major categories: Category A is verified protection, Category B is mandatory protection, Category C is discretionary protection, and Category D is minimal protection.
- What is a trusted computing base (TCB)?
The combination of hardware, software, and controls that work together to enforce a security policy
The combination of hardware, software, and controls that work together to enforce a security policy
The TCB is the combination of hardware, software, and controls that work together to enforce a security policy.
- What is a security perimeter? (Choose all that apply.)
The boundary of the physically secure area surrounding your system
The imaginary boundary that separates the TCB from the rest of the system
The boundary of the physically secure area surrounding your system
The imaginary boundary that separates the TCB from the rest of the system
Answer: A;B
Although the most correct answer in the context of this chapter is Option B, Option A is also a correct answer in the context of physical security.
- What part of the TCB concept validates access to every resource prior to granting the requested access?
Reference monitor
Reference monitor
The reference monitor validates access to every resource prior to granting the requested access. Option D, the security kernel, is the collection of TCB components that work together to implement the reference monitor functions. In other words, the security kernel is the implementation of the reference monitor concept. Options A and B are not valid TCB concept components.
- What is the best definition of a security model?
A security model provides a framework to implement a security policy.
A security model provides a framework to implement a security policy.
Option B is the only option that correctly defines a security model. Options A, C, and D define part of a security policy and the certification and accreditation process.
- Which security models are built on a state machine model?
Bell-LaPadula and Biba
Bell-LaPadula and Biba
The Bell-LaPadula and Biba models are built on the state machine model.
- Which security model addresses data confidentiality?
A. Bell-LaPadula
B. Biba
C. Clark-Wilson
D. Brewer and Nash
Bell-LaPadula
Only the Bell-LaPadula model addresses data confidentiality. The Biba and Clark-Wilson models address data integrity. The Brewer and Nash model prevents conflicts of interest.
- Which Bell-LaPadula property keeps lower-level subjects from accessing objects with a higher security level?
A. * (star) Security Property
B. No write up property
C. No read up property
D. No read down property
No read up property
The no read up property, also called the Simple Security Policy, prohibits subjects from reading a higher security level object.
- What is the implied meaning of the simple property of Biba?
A. Write down
B. Read up
C. No write up
D. No read down
Read up
The simple property of Biba is no read down, but it implies that it is acceptable to read up.
- When a trusted subject violates the star property of Bell-LaPadula in order to write an object into a lower level, what valid operation could be taking place?
Declassification
Declassification
Declassification is the process of moving an object into a lower level of classification once it is determined that it no longer justifies being placed at a higher level. Only a trusted subject can perform declassification because this action is a violation of the verbiage of the star property of Bell-LaPadula, but not the spirit or intent, which is to prevent unauthorized disclosure.
- What security method, mechanism, or model reveals a capabilities list of a subject across multiple objects?
Access control matrix
Access control matrix
An access control matrix assembles ACLs from multiple objects into a single table. The rows of that table are the ACEs of a subject across those objects, thus a capabilities list.
- What security model has a feature that in theory has one name or label, but when implemented into a solution, takes on the name or label of the security kernel?
Trusted computing base
Trusted computing base
The trusted computing base (TCB) has a component known as the reference monitor in theory, which becomes the security kernel in implementation.
- Which of the following is not part of the access control relationship of the Clark-Wilson model?
Programming language
Programming language
The three parts of the Clark-Wilson model’s access control
relationship (aka access triple) are subject, object, and program (or interface).