Domain 3 (Security Engineering) Flashcards

1
Q

What is the Trusted Computer Base (TCB)?

A

All of the protection mechanisms within a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Security Perimeter?

A

It seperates that trusted and untrusted components within a computer system (inside/outside TCB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Reference Monitor?

A

Mediates subject access to object permittions (Rules)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Security Kernel?

A

Enforces the Reference Monitor. That which falls inside the TCB. (Enforcement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four CPU cycles?

A

Fetch
Decode
Execute
Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do Security Models do?

A

Security policy outlines goals, Security Model provides the how-to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the characteristics of the Bell-Lapadula?

A

Focused on confidentiality.

1) Cant read higher then subjects security clearance.
2) Cannot write data to level lower.
3) Can only read/write at own level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the characteristics of the Biba Model?

A

Focused on integrity. Uses integrity levels. Down Data’s Dirty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the characteristics of the Clark-Wilson model?

A

Focused on integrity. Separation of duties. Keep users out of your stuff or they’ll break it. Force a user through an API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly