Cyber8336 - Trusted OS Model Flashcards

1
Q

What are three desirable properties of a trusted OS model

A

Generality: Formal verification
Appropriateness: faithful to the conditions of the operating environment
Predictive ability: allow simulation and query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the generality of a trusted OS model help.

A

Helps establish the internal validity of a model or abstract policy specification. Helps to generate automated test cases to verify the code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is predictive ability a desired property of a trusted OS model?

A

This allows simulation and querying.
Simulation allows us to mathematically reason about counter examples in the system context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is appropriateness a desired property of a mathematical model of a policy Trusted OS’s?

A

appropriateness is desired so the model maps faithfully to the conditions of the operating environment and models accomadations that were to difficult to be included in the more abstract policy statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Bell Lapadula model based on.

A

It is a multilevel security model based on finite state machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Basic Security Theorem specified by Bell and Lapadula?

A

All controls are security preserving if a sequence of actions from a secure state results in a new secure state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the *-property?

A

A subject S who has Read access to an object O may have write access to an object P, only if P dominates O.
A subject can only write to the level of the Read access or above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why don’t we have the *-property in the paper context?

A

In the paper world we do not have programs performing operations on behalf of the subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Does the *-Property prevent covert channels? Why or why not?

A

The *-property does not prevent covert channels because it is enforced at the reference monitor. The reference monitor is bypassed in the creation of covert channels. Separate analysis is necessary at design time to make sure they don’t cross levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Biba model

A

It is a dual of the Bell Lapadula concerned with integrity, and provides the simple integrity property and the Integrity *-property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly