Domain 3 - Security Engineering Flashcards
DES
Data Encryption Standard
- 64 bit blocks of text
- 64 bit key, 8 bits for parity
- EFFECTIVE KEY LENGTH is 56 bits
- TOTAL KEY LENGTH is 64 bits
- Since DES uses BLOCK size of 64, result is still 64 bits of encrypted data even though effective key size is 56 bits
DES - EFFECTIVE key length
56 bits
DES - TOTAL key length
64 bits
AES
Advanced Encryption Standard
- Sequences of 128-bit blocks
- Cipher key can be 128, 192, 256 bits
- AES-128, AES-192, AES-256
Bell-LaPadula
MANDATORY ACCESS CONTROL
- CONFIDENTIALITY
- Simple Security Property (NRU)
- Security Property (NWD)
- Strong Tranquility Property
- Weak Tranquility Property
Bell-LaPadula - Simple Security Property
No Read Up (NRU)
Bell-LaPadula - * Security Property
No Write Down (NWD)
Bell-LaPadula - Strong Tranquility Property
The security label will not change when the system is operating
Bell-LaPadula - Weak Tranquility Property
The security label will not change in a way that conflicts with defined security properties
Biba
INTEGRITY
- Simple Integrity Axiom
- Integrity Axiom
Biba - Simple Integrity Axiom
No Read Down (NRD)
Biba - * Integrity Axiom
No Write Up (NWU)
Clark-Wilson
INTEGRITY
- Separation of Duties (SoD)
- Well-formed transactions
Clark-Wilson - “Access Control Triple”
TP - Transaction Procedure (well formed transaction)
CDI - Constrained Data Item (data that requires integrity)
UDI - Unconstrained Data Item (data that does not require integrity)
IVP - Integrity Verification Procedures (ensures data is kept in a valid state)
Clark Wilson - Transaction Procedure
Well-formed transaction
Clark Wilson - Constrained Data Item
Data that requires integrity
Clark Wilson - Unconstrained Data Item
Data that does not require integrity
Clark Wilson - Integrity Verification Procedures
Ensures that data is kept in a valid state
Information Flow Model
Uses a lattice
Objects are labeled with security CLASSES
Information can flow either upward or at the same level
Both Bell-LaPadula AND Biba use the Information Flow Model
Reading Down and Writing Up
Applies to Bell-LaPadula
NRU/NWD are the opposite of this
State Machine Model
Mathematical model that groups all possible system occurrences
Occurrences are called STATES
Chinese Wall Model
Designed to avoid CONFLICTS OF INTEREST
Chinese Wall Model - CoI’s
CoI’s = Conflict of Interest categories
Noninterference
Ensures data in different security domains remains separate from one another
Prevents covert channels
Each data access attempt is independent from others
Take-Grant
Contains rules that govern the interactions between subjects and objects, including permissions subjects can grant to other subjects
Take-Grant - Four Rules
Take, Grant, Create, Remove
TCSEC
Trusted Computer System Evaluation Criteria (TCSEC)
NIST and NCSC (National Computer Security Center)
AKA Orange Book
DOES NOT address networks. Systems only
TCSEC/Orange Book - Divisions
D: Minimal Protection
C: Discretionary Protection (C1, C2)
B: Mandatory Protection (B1, B2, B3)
A: Verified Protection (A1)