CISSP ch 8 Flashcards

1
Q

Cascading composition theory

A

input for one system comes from the output of another system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Feedback composition theory

A

one system provides input to another system, which reciprocates by reversing those roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hookup composition theory

A

one system sends input to another system, but also sends input to external entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Noninterference Model

A

concerned with how the actions of a subject a higher security level affect the system state or the actions of a subject at a lower security level = the actions of a subject at a higher level should not affect, interfere or be noticed by a subject at a lower level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Take-Grant model

A

employs a directed graph to dictate how rights can be passed from one subject to another or from a subject to an object = subjects can grant rights that they possess, or take rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Grant rule (Take-Grant model)

A

allows a subject to grant rights to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Take rule (Take-Grant model)

A

allows a subject to take rights over an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Create rule (Take-Grant model)

A

allows a subject to create new rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Remove rule (Take-Grant model)

A

allows a subject to remove rights it has

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ACL

A

Access control list, list subjects that can access a given object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Column of an access control matrix

A

an access control list (ACL) pulled from objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Row of an access control matrix

A

each row of the matrix is a capabilities list for each listed subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bell-LaPadula Model

A

developed by the US Department of Defense (DoD) in the 1970’s = multilevel security policy where a subject with any level of clearance can access resources at or below its clearance level = within clearance levels, access to a compartmentalized objects is granted only on a need-to-know basis = prevents the leaking or transfer of classified information to less secure clearance levels = focused on maintaining confidentiality = built on a state machine concept and the information flow model, employs mandatory access controls and is a lattice-based access control concept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bell-LaPadula Simple Security Property

A

no read-up = a subject may not read information at a higher sensitivity level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bell-LaPadula * (star) Security Property

A

Confinement Property = no write-down = a subject may not write information to an object at a lower sensitivity level

Exception: A “trusted subject” is not constrained by the * Security Property, and is guaranteed not to consummate a security-breaching information transfer even if it is possible, i.e., allowed to write-down, which is necessary when performing valid object declassification or reclassification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Lattice-Based Access Control

A

subjects are assigned positions in a lattice and can only access those objects that fall into the range between

  • the least upper bound (LUB) (the nearest security label or classification higher than their lattice position and
  • the greatest lower bound (GLB) (the nearest security label or classification lower than their lattice position) of the labels or classifications of their lattice position
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

LUB (Lattice-Based Access Control)

A

least upper bound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

GLB (Lattice-Based Access Control)

A

greatest lower bound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Biba-model

A

designed after Bell-LaPadula model, but focuses on integrity, also DoD-derived = built on a state machine concept and the information flow model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Simple Integrity Property (Biba)

A

no read-down = a subject cannot read an object at a lower integrity level

21
Q
  • (star) Integrity Property (Biba)
A

no write-up = a subject cannot modify an object at a higher integrity level

22
Q

defines each data item and allows modifications through only a limited or controlled intermediary program or interface (as opposed to defining a formal state machine) = does not require the use of a lattice structure, rather it uses a three-part relationship of subject/program/object known as a triple or an access control triplet = subjects do not have direct access to object, objects can only be accessed through programs = protects integrity, but can lend itself to protect confidentiality

A

Clark-Wilson Model

23
Q

Clark-Wilson principles

A
  • Well formed transactions
  • Separation of duties

also: three-part relationship of subject/program/object known as a triple or an access control triplet

Uses security labels to grant access to objects, but only through transformation procedures and a restricted interface model (restriction interface model uses classification-based restrictions to offer only subject-specific authorized information and function)

24
Q

CDI (Clark-Wilson Model)

A

Constrained data item = any data item whose integrity is protected by the security model

25
Q

UDI (Clark-Wilson Model)

A

Unconstrained data item = any data item that is not controlled by the security model = any data that is to be input and hasn’t validated = any output

26
Q

IVP (Clark-Wilson Model)

A

integrity verification procedure = a procedure that scans items and confirms their integrity

27
Q

TPs (Clark-Wilson Model)

A

transformation procedures = only procedures that are allowed to modify a CDI

28
Q

Chinese Wall model / ethical wall / cone of silence = created to permit access controls to change dynamically based on a user’s previous activity (type of state machine model) = applies to a single integrated database = seeks to create security domains that are sensitive to the notion of conflict of interest = creates a class of data that defines which security domains are potentially in conflict and prevents any subject with access to one domain that belongs to a specific conflict class from accessing any other domain that belongs to the same conflict class = metaphorically puts a wall around all other information in any conflict class

A

Brewer and Nash Model

29
Q

integrity model, foundation of noninterference model = based on predetermining the set or domain (i.e., a list) of objects that a subject can access, subjects are allowed only to perform predetermined actions against predetermined objects = similar users are grouped into their own domain, the members of one subject domain cannot interfere with the members of another subject domain

A

Goguen-Meseguer Model

30
Q

integrity model = focuses on preventing interference in support of integrity, based on state machine model and information flow model, but does not directly indicate specific mechanisms for protection of integrity = based on the idea of defining a set of systems states, initial states and state transitions; through the use of only these predetermined secure states, integrity is maintained and interference is prohibited

A

Sutherland Model

31
Q

focused on the secure creation and deletion of both subjects and objects = specific abilities or permissions of a subject over a set of objects is defined in an access matrix = eight primary protection rules or actions that define the boundaries of certain secure actions:
- Securely create an object
- Securely create a subject
- Securely delete an object
- Securely delete a subject
- Securely provide the read access right
- Secure provide the grant access right
- Securely provide the delete access right
- Securely provide the transfer access right

A

Graham-Denning Model

32
Q

focuses on the assignment of object access rights to subjects, as well as the resilience of those assigned rights = extension of the Graham-Denning model = centered around the establishment of a finite set of procedures (or access rights) that can be used to edit or alter the access rights of a subject over an object = state of access rights can be expressed in a matrix, where the rows are subjects and the columns are objects, intersection of each row and column will include the specific procedures that each subject is allowed to perform against each object = a finite set of commands or primites is defined that controls how the matrix can be modified by authorized subjects

A

HRU model = Harrison -Ruzzo-Ullman

33
Q

HRU model

A

Harrison -Ruzzo-Ullman = focuses on the assignment of object access rights to subjects, as well as the resilience of those assigned rights = extension of the Graham-Denning model = centered around the establishment of a finite set of procedures (or access rights) that can be used to edit or alter the access rights of a subject over an object = state of access rights can be expressed in a matrix, where the rows are subjects and the columns are objects, intersection of each row and column will include the specific procedures that each subject is allowed to perform against each object = a finite set of commands or primites is defined that controls how the matrix can be modified by authorized subjects

34
Q

CC

A

Common Criteria = various levels of testing and confirmation of systems’ security capabilities, and the number of the level indicates what kind of testing and confirmation has been performed = published as ISO/IEC 15408-1, -2 and -3 “Information technology – Security techniques – Evaluation criteria for IT security”, = dynamic subjective product evaluation model that replaced previous static systems, such as the US Department of Defense’s Trusted Computer System Evaluation Criteria (TCSEC) and the EU’s Information Technology Security Evaluation Criteria (ITSEC)

35
Q

TOE (CC)

A

Target of evaluation = product to be evaluated

36
Q

PP (CC)

A

Protection Profiles = desired measures = security requirements and protections (security desires) specified by a customer for a product that is to be evaluated (the TOE)

37
Q

ST (CC)

A

Security Targets = implemented measures = claims of the security from the vendor that are built into a TOE

Vendors may also offer packages of additional security features, which are an intermediate grouping of security requirement components that can be added or removed from a TOE

38
Q

EAL (CC)

A

evaluation assurance levels, 1 to 7

EAL1 = Functionally tested
o Some confidence in correct operation is required
o Threats to security are not serious
o Provides independent assurance that due care has been exercised in protecting personal information

EAL2 = Structurally tested
o Delivery of design information and test results are in keeping with good commercial practices
o Low to moderate levels of independently assured security
o Especially relevant when evaluating legacy systems

EAL3 = Methodically tested and checked
o Security engineering begins at the design stage and is carried through without substantial subsequent alteration
o Moderate level of independently assured security

EAL4 = Methodically designed, tested and reviewed
o Rigorous, positive security engineering and good commercial development practices are used
o Does not require substantial specialist knowledge, skills or resources
o Independent testing of all TOE security functions

EAL5 = Semi-formally designed and tested
o Rigorous security engineering and commercial development practices, including specialist security engineering techniques, for semi-formal testing
o High level of independently assured security in a planned development approach, followed by rigorous development

EAL6 = Semi-formally verified, designed and tested
o Direct, rigorous security engineering techniques at all phases of design, development, and testing to produce a premium TOE
o TOEs for high-risk situations, where value of protected assets justifies additional cost
o Extensive testing reduces risks of penetration, probability of covert channels, and vulnerability to attack

EAL7 = Formally verified, designed and tested
o Highest risk situations or where high-value assets are involved
o Limited to TOEs where tightly focused security functionality is subject to extensive formal analysis and testing

39
Q

ATO

A

Authorization to Operate = an official approval to use secured equipment for operational objectives and accept the identified risk = decision is issued when risk is managed to an acceptable level = term defined by the Risk Management Framework (see NIST SP 800-37r2), replacing former term “accreditation” and C&A (certification and accreditation) process = performed by an Authorizing Official (AO) = typically issued for 5 years and must be reobtained if:
- The ATO time frame has expired
- The system experiences a significant security breach or a significant security change

40
Q

AO

A

Authorizing Official = authorized entity who can evaluate an IT/IS system, its operations, and its risks, and potentially issue an ATO

41
Q

DAA

A

Designated approving authority

42
Q

AA

A

Approving authority

43
Q

SCA

A

Security Control Assessor

44
Q

RO

A

Recommending Official

45
Q

Common control authorization

A

when a security control is inherited from another provider and the risk associated with the common control is at an acceptable and already has an ATO from the same AO

46
Q

Authorization to use

A

when a third-party provider provides IT/IS servers that are deemed to have risk at an acceptable level; also used to allow for reciprocity in accepting another AO’s ATO

47
Q

Denial of authorization

A

when risk is unacceptable

48
Q

Meltdown

A

Memory error discovered in 2017 - Allows for reading of private kernel memory contents by a nonprivileged process

Arose from methods used by modern CPUs to predict future instructions to optimize performance, enabling them to seemingly make reliable predictions about what code to retrieve or process even before requested. When the speculative execution is wrong, the procedure is not completely reversed, resulting in data remnants being left behind in memory in an unprotected state

49
Q

Spectre

A

Memory error discovered in 2017 - Enables the wholesale theft of memory contents from other running applications

Arose from methods used by modern CPUs to predict future instructions to optimize performance, enabling them to seemingly make reliable predictions about what code to retrieve or process even before requested. When the speculative execution is wrong, the procedure is not completely reversed, resulting in data remnants being left behind in memory in an unprotected state