Domain 3: Security Models Flashcards

1
Q

Ensures that a system behaves properly in all cases and that it adheres to the security policy under all circumstances. It is the combination of hardware, software, and controls that work together to enforce your security policy.

A

Trusted Computing Base (TCB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Design principle that is a combination of hardware, software, and controls that work together to form a trusted base to enforce the security policy.

A

Trusted Computing Base (TCB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A system that is secure no matter what state it is in.

A

State Machine Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Focuses on controlling the flow of information.

A

Information Flow Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Based on the state machine model. However, instead of being concerned about the flow of information, it is concerned with how the actions of a subject at a higher security level affect the system state or the actions of a subject at a lower security level.

A

Information Flow Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Designed to prevent unauthorized, insecure, or restricted information flow, often between different levels of security (Known as multilevel models).

A

Information Flow Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Loosely based on the Information Flow Model, but is concerned with how the actions of a subject at a higher security level affect the system state or the actions of a subject at a lower security level.

A

Noninterference Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Employs a directed graph to dictate how rights can be passed from one subject to another or from a subject to an object.

A

Take-Grant Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Focused on maintaining confidentiality and is built on a state machine and the information flow model.

A

Bell-LaPadula Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Employs mandatory access controls and is a lattice-based access control concept.

A

Bell-LaPadula Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Simple Security Property (ss-Property) = No Read Up

A

Bell-LaPadula Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Star Property (*-Property) = No Write Down

A

Bell-LaPadula Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Focuses on integrity. Built on a state machine concept, is based on information flow, and is a multilevel model.

A

Biba Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Simple Integrity Property = No Read Down

A

Biba Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Star Property (*-Property) = No Write Up

A

Biba Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the SIMPLE property about?

A

Read Capability

17
Q

What is the STAR property about?

A

Write Capability

18
Q

What is the primary goal of the Clark-Wilson Model?

A

To ensure data integrity through well-formed transactions and separation of duties.

19
Q

Which two main elements are enforced by the Clark-Wilson model to maintain date integrity?

A

Well-formed transactions and separation of duties.

20
Q

In the Clark-Wilson Model, what are Transformation Procedures (TPs)?

A

Programs or processes that take unconstrained data and transform it into secure, validated form.

21
Q

What are Constrained Data Items (CDIs) in the Clark-Wilson Model?

A

Any data item whose integrity is protected by the security model. This data can only be manipulated by authorized Transformation Procedures (TPs).

22
Q

Uses security labels to grant access to objects, but only through Transformation Procedures (TPs) and a restricted interface model

A

Clark-Wilson Model

23
Q

Does not require the use of a lattice structure; rather, it uses a three-part relationship of subject/program/object (or subject/transaction/object) known as a triple or access control triplet.

A

Clark-Wilson Model

24
Q

Ensures that the actions of different objects and subjects aren’t seen by (and don’t interfere with) other objects and subjects on the same system.

A

Non-Interference Model

25
Q

Rules around invocations (calls), such as to subjects. States that a process from below cannot request higher access (neither read nor write); only with subjects at an equal or lower lever.

A

Invocation Property

26
Q

THE non-interference model

A

Goguen and Meseguer

27
Q

Preventing interference (information flow and State Machine Model (SMM))

A

Sutherland

28
Q

Referrred to as the Chinese Wall model (now deprecated)

A

Brewer and Nash Model

29
Q

Referred to as the “Ethical Wall”

A

Brewer and Nash Model

30
Q

Referred to as the “Cone of Silence”

A

Brewer and Nash Model

31
Q

Employs a “Directed Graph”

A

Take-Grant Model

32
Q

What are Unconstrained Data Items (UDI)?

A

Clark-Wilson Model - Any data item that is NOT controlled by the security model.

33
Q

What is an Integrity Verification Procedure (IVP)?

A

Clark-Wilson Model - A procedure that scans data items and confirms their integrity.

34
Q

What are Transformation Procedures (TPs)?

A

Clark-Wilson Model - The only procedures that are allowed to modify a Constrained Data Item (CDI).

35
Q

Confidentiality-based model that supports four basic operations: Take, Grant, Create, Revoke

A

Take-Grant Model

36
Q

Confidentiality-based model developed to prevent Conflict of Interest (COI) problems

A

Brewer and Nash Model

37
Q

This model uses a formal set of protection rules for which each object has an owner and a controller.

A

Graham-Denning Model

38
Q

This model is focused on the secure creation and deletion of both subjects and objects.

A

Graham-Denning Model

39
Q

States that the system uses an access matrix to enforce discretionary access control.

A

Discretionary Security Property