Domain 3: Security Models Flashcards
Ensures that a system behaves properly in all cases and that it adheres to the security policy under all circumstances. It is the combination of hardware, software, and controls that work together to enforce your security policy.
Trusted Computing Base (TCB)
Design principle that is a combination of hardware, software, and controls that work together to form a trusted base to enforce the security policy.
Trusted Computing Base (TCB)
A system that is secure no matter what state it is in.
State Machine Model
Focuses on controlling the flow of information.
Information Flow Model
Based on the state machine model. However, instead of being concerned about the flow of information, it is concerned with how the actions of a subject at a higher security level affect the system state or the actions of a subject at a lower security level.
Information Flow Model
Designed to prevent unauthorized, insecure, or restricted information flow, often between different levels of security (Known as multilevel models).
Information Flow Model
Loosely based on the Information Flow Model, but is concerned with how the actions of a subject at a higher security level affect the system state or the actions of a subject at a lower security level.
Noninterference Model
Employs a directed graph to dictate how rights can be passed from one subject to another or from a subject to an object.
Take-Grant Model
Focused on maintaining confidentiality and is built on a state machine and the information flow model.
Bell-LaPadula Model
Employs mandatory access controls and is a lattice-based access control concept.
Bell-LaPadula Model
Simple Security Property (ss-Property) = No Read Up
Bell-LaPadula Model
Star Property (*-Property) = No Write Down
Bell-LaPadula Model
Focuses on integrity. Built on a state machine concept, is based on information flow, and is a multilevel model.
Biba Model
Simple Integrity Property = No Read Down
Biba Model
Star Property (*-Property) = No Write Up
Biba Model
What is the SIMPLE property about?
Read Capability
What is the STAR property about?
Write Capability
What is the primary goal of the Clark-Wilson Model?
To ensure data integrity through well-formed transactions and separation of duties.
Which two main elements are enforced by the Clark-Wilson model to maintain date integrity?
Well-formed transactions and separation of duties.
In the Clark-Wilson Model, what are Transformation Procedures (TPs)?
Programs or processes that take unconstrained data and transform it into secure, validated form.
What are Constrained Data Items (CDIs) in the Clark-Wilson Model?
Any data item whose integrity is protected by the security model. This data can only be manipulated by authorized Transformation Procedures (TPs).
Uses security labels to grant access to objects, but only through Transformation Procedures (TPs) and a restricted interface model
Clark-Wilson Model
Does not require the use of a lattice structure; rather, it uses a three-part relationship of subject/program/object (or subject/transaction/object) known as a triple or access control triplet.
Clark-Wilson Model
Ensures that the actions of different objects and subjects aren’t seen by (and don’t interfere with) other objects and subjects on the same system.
Non-Interference Model
Rules around invocations (calls), such as to subjects. States that a process from below cannot request higher access (neither read nor write); only with subjects at an equal or lower lever.
Invocation Property
THE non-interference model
Goguen and Meseguer
Preventing interference (information flow and State Machine Model (SMM))
Sutherland
Referrred to as the Chinese Wall model (now deprecated)
Brewer and Nash Model
Referred to as the “Ethical Wall”
Brewer and Nash Model
Referred to as the “Cone of Silence”
Brewer and Nash Model
Employs a “Directed Graph”
Take-Grant Model
What are Unconstrained Data Items (UDI)?
Clark-Wilson Model - Any data item that is NOT controlled by the security model.
What is an Integrity Verification Procedure (IVP)?
Clark-Wilson Model - A procedure that scans data items and confirms their integrity.
What are Transformation Procedures (TPs)?
Clark-Wilson Model - The only procedures that are allowed to modify a Constrained Data Item (CDI).
Confidentiality-based model that supports four basic operations: Take, Grant, Create, Revoke
Take-Grant Model
Confidentiality-based model developed to prevent Conflict of Interest (COI) problems
Brewer and Nash Model
This model uses a formal set of protection rules for which each object has an owner and a controller.
Graham-Denning Model
This model is focused on the secure creation and deletion of both subjects and objects.
Graham-Denning Model
States that the system uses an access matrix to enforce discretionary access control.
Discretionary Security Property