Domain 3 Flashcards
A security model that prevents a secret cleared subject from reading a top secret object. Also includes ‘no read up’ rule and focuses on protecting confidentiality
Bell-Lapadula
Biba is a model that protects _____
integrity
This security model is ‘no read down’ and ‘no write up’
BIba
This security model protects integrity by requiring subjects to access objects via programs. It focuses on having well formed transactions and separation of duties and access triple
Clark-Wilson
This security model is designed to avoid conflicts of interest by prohibiting one person from accessing multiple conflict of interest categories
Chinese Wall aka Brewer Nash
A table that defines the access permissions that exist between specific subjects and objects
access control matrix
A list of objects a subject is allowed to access
security domain
Processes communicate between CPU rings via _____ which allows processes to communicate with the kernel and provide a window between the rings
system calls
The ____ is the computer’s case that houses the computer’s internal electronic computer components ex: motherboard
system unit
This part of the CPU performs mathematical calculations
ALU (arithmetic logic unit)
The ALU is fed instructions by the ____ unit.
control
What is the ‘fetch and execute’ (aka FDX) steps?
- Fetch Instruction 1
- Decode Instruction 1
- Execute Instruction 1
- Write (save) Result 1
_____ combines multiple CPU steps into one process
pipelining
A parent process can spawn additional child processes called ____
threads
____ segmentation maps processes to specific memory locations
hardware
_____ provides virtual address mapping between applications and hardware memory
virtual mapping
____ uses virtual memory to to copy contents of primary memory (RAM) to secondary memory (CD)
Swapping
This storage can be written to once and read many times
WORM (write once, read many)
____ attempts to prevent code execution in memory locations that are not predefined to contain executable content
DEP (data execution prevention)
____ makes software exploitation more difficult by randomizing memory addresses
ASLR (address space location randomization)
____ mediates all access between subjects and objects and is ran by the kernel
reference monitor
Malware that needs a host
virus
Malware that self propogates
worm
A neutral technology used to shrink the size of executables
packer