Domain 3 (Security Engineering) Flashcards
What is the Trusted Computer Base (TCB)?
All of the protection mechanisms within a computer system
What is the Security Perimeter?
It seperates that trusted and untrusted components within a computer system (inside/outside TCB)
What is the Reference Monitor?
Mediates subject access to object permittions (Rules)
What is the Security Kernel?
Enforces the Reference Monitor. That which falls inside the TCB. (Enforcement)
What are the four CPU cycles?
Fetch
Decode
Execute
Store
What do Security Models do?
Security policy outlines goals, Security Model provides the how-to
What are the characteristics of the Bell-Lapadula?
Focused on confidentiality.
1) Cant read higher then subjects security clearance.
2) Cannot write data to level lower.
3) Can only read/write at own level
What are the characteristics of the Biba Model?
Focused on integrity. Uses integrity levels. Down Data’s Dirty.
What are the characteristics of the Clark-Wilson model?
Focused on integrity. Separation of duties. Keep users out of your stuff or they’ll break it. Force a user through an API.