Domain 3 - Security Models Flashcards

1
Q

Open/Closed Systems

A

Closed systems are usually single manufacturer ecosystems, using proprietary standards. Open systems use industry standards, easier to integrate, more widely targeted–distinct from open source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trusted Computing Base

A

A combination of hardware, software, and controls that work together to allow a portion of the information system to be trusted to adhere to and enforce the security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Perimeter

A

The line between the Trusted Computing Base and the rest of the system. All communications between the two happen along “trusted paths”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reference Monitor

A

The part of the Trusted Computing Base that validates access to every resource prior to granting access requests. It is the access enforcer for the TCB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bell-LaPadula Model

A

DoD Model from the 70s, with three security properties (simple sec. prop; star sec.prop; discretionary sec. prop).
Only concerned with confidentiality. Built on state machine model and information flow model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bell-LaPadula Discretionary Security Property

A

Access is enforced by an access matrix. Enforces subject’s “need to know”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Clark-Wilson Model

A

“Access Control Triad”, three-part relationship, subject/program/object. Constrained Interface. Focused on integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Brewer and Nash Model / Chinese Wall

A

Access changes dynamically based on a subject’s previous activity, such as that which presents a conflict of interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information flow model

A

Information is restricted to flow in the directions that are permitted by the security policy. Thus flow of information from one security level to another. (Bell & Biba).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Matrix (Access control model)

A

Provides access rights including discretionary access control to subjects for different objects.

Read, write and execute access defined in ACL as matrix columns and rows as capability lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Simple Property

A

Read. In Biba, no read down. In Bell-LaPadula, no read up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Star Property

A

Write. In Biba, no write up. In Bell-LaPadula, no write down. Also called confinement property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly