Domain 3 set 3 Flashcards
The Main stream Security Mode is ?
Clark-Wilson
NON-DOD
the Down Data’s Dirty is what Security Mode?
BIBA Model
- Integrity Axiom means what?
NO Write UP
BIBA Model
The Processor Functions in What Ring?
Ring 3
What Ring is the User Mode in?
Ring 3
What Ring is the Privileged Mode in?
Ring 0
The 5 types of CPU executions?
- Multi programming (windows 3.1)
- Multitasking
- Multitheading
- Multiprocessing
- Multi-core processors
The Two types of Multitasking?
Cooperative
Preemptive
Cooperative Multitasking does not do what?
no isolation of the individual processes
Very high speed memory used for storage by the CPU is called?
Registers
Execution or CPU Cycle is when?
The Control Unit and ALU performs the mathematical or logical operations on the DATA
Used by the Processor to keep track of which instruction code have been processed and what ones will be processed next
Instruction Pointer
CPU Fetch?
When the Control unit gets the instructions from the System Memory.
The 4 CPU cycles?
- Fetch
- Decode
- Execute
- Store
TCB ?
Trusted Computer BaseIt secures the cpu, memory, OS Kernel and Firmware.
It Delineates the trusted and untrusted components within a computer system
Security Perimeter
*** It Isolates the TCB
Isolates the Trusted Computer Base (TCB)?
Security Perimeter
Security Kernel
The EnforcerEnforces the Reference Monitor Concept
performs the mathematical or logical operations on the DATA it gets from memory
ALU
What are the 3 Elements of the Trusted Computer Base (TCB)
- Security Perimeter
- Reference Monitor
- Security Kernel
Is an Abstract Machine concept that mediate ALL access between SUBJECTS and OBJECTS
Reference MonitorTHE Rules
Windows 10 Falls under what TCSEC Level
C
the operation Mode that use a Reference Monitor to control Access?
Multilevel
Operation Mode that enforces an AIRGAP
Dedicated
Which Security Feature prevents an Covert Channel?
NON Interference
Called the Orange Book
TCSECTrusted Computer System Evaluation Criteria
TCSEC
Trusted Computer System Evaluation Criteria
NO Read Down and No Write UP, is what Security Model?
BIBA Model
What Model uses ALPHA, BETA GAMMA
The Lattice-Based Access Controls
What security model does not prevent unauthorized alterations of High-Level Data?
Bell-Lapadula Model
NO READ UP and NO Write DOWN is what Security Model?
Bell-Lapadula Model
what Security Model protects Confidentialy?
Bell-Lapadula Model