Chpt 8 Flashcards

1
Q

What is the process called when the management of an organization formally recognizes a system?

A

Accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the process called when a system passes the technical evaluation?

A

Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Confinement?

A

A restriction of a process to reading from and writing to certain memory locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are bounds?

A

The limits of memory a process can it exceed when reading or writing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is isolation?

A

The mode a process runs in when it is confined through the use of memory bounds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a subject?

A

The user or process that performs an action on an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an object?

A

The resource a user or process wants to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the classes of TCSEC

A
  1. Verified protection
  2. Mandatory protection
  3. Discretionary protection
  4. Minimal protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does TCB stand for?

A

Trusted Computer Base

It is the combo of hardware, software and controls that form a trusted base that enforces a security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a security perimeter?

A

The imaginary boundary that separates the TCB from the rest of the system. It can only be crossed using trusted paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a reference monitor?

A

The logical part of the TCB that confirms whether a subject has the right to access an object prior to granting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a closed system?

A

A system that uses largely proprietary or unpublished protocols and standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a simple property of BIBA?

A

No Read Down, but implies that it is acceptable to read up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What models are built on state machine models?

A

Bell-LaPadula and BIBA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the best definition of a security model?

A

A security model provides a framework to implement a security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which security model addresses data confidentiality?

A

Bell-Lapudla

17
Q

Which security model addresses data integrity?

A

BIBA and Clark-Wilson

18
Q

Which security model addresses conflicts of interest?

A

Brewer and Nash

19
Q

What are the three parts of Clark-Wilson’s Access Control relationship?

A

Subject
Object
Program (interface)

20
Q

What does Bell-LaPudla’s no read up property do?

A

It keeps lower-level subjects from accessing higher security level objects