Domain 3: Security Models Flashcards
- Reading down occurs when a subject reads an object at a lower sensitivity level
- i.e. top secret subject reading a secret object
- i.e. Bell-LaPadula
Reading Down and Writing Up
- Provides confidentiality of objects
- Users at lower security level are denied access to objects at a higher security level
Bell-LaPadula
- Bell-LaPadula Property
- “No read up”; a subject at a specific clearance level cannot read an object at a higher classification level
Simple Security Property
- Bell-LaPadula Property
- “No write down”; a subject at a higher clearance level cannot write to a lower classification level.
*(star) Security Property
- Bell-LaPadula Property
- States that the system uses an access matrix to enforce access control
Discretionary Security Property
- Bell-LaPadula Property
- Security labels will not change while the system is operating
Strong Tranquility Property
- Bell-LaPadula Property
- Security labels will not change in a way that conflicts with defined security properties
Weak Tranquility Property
- Subjects can only access objects that fall into a range between the least upper bound and the highest lower bound.
Lattice-based access control
The the nearest security label or classification higher than their lattice position
Least upper bound
The the nearest security label or classification lower than their lattice position
Highest lower bound
- Describes a system that is always secure no matter what state it is in
- Based on computer science definition of finite state machine (FSM)
State Machine Model
Security model designed to prevent unauthorized , insecure or restricted information flow, between different levels of security
Information Flow Model
Security model that prevents actions from a subject at a higher security level to not affect actions at a lower security level or even be noticed
Noninterference Model
Security model that deploys a graph that dictates how rights can be passed from one subject to another or from a subject to an object
Take-Grant Model
- Prevents modification of objects by unauthorized subjects
- Prevents unauthorized modification of objects by authorized subjects
- Protect internal object consistency
- Integrity model
Biba Model