Domain 3A: Security Architecture and Engineering Flashcards
What are the properties of the Bell LaPadula model?
Bell-LaPadula: (Confidentiality) (Mandatory Access Control):
- Simple Security Property “No Read UP”.
- Subjects with Secret clearance can’t read Top Secret data.
- Security Property: “No Write DOWN”.
- Subjects with Top Secret clearance can’t write Top Secret information to Secret folders.
- Strong * Property: “No Read or Write UP and DOWN”.
- Subjects can ONLY access data on their own level.
What is lattice based access control?
Lattice-based access control allows security controls for complex environments. For every relationship between a subject and an object, there are defined upper and lower access limits implemented by the system
What are the properties of the BIBA model?
BIBA: (Integrity) (Mandatory Access Control):
- Simple Integrity Axiom: “No Read DOWN”.
- Subjects with Top Secret clearance can’t read Secret data.
- Remember that integrity is the purpose here; we don’t want to have wrong or lacking lower clearance level data confuse us.
- Integrity Axiom : “No Write UP”.
- Subjects with Secret clearance can’t write Secret information to Top Secret folders.
- We don’t want wrong or lacking lower level information to propagate to a higher level.
- Invocation Property: “No Read or Write UP”.
- Subjects can never access or alter data on a higher level
How do Biba and Bell-LaPadula differ?
Biba takes the Bell-LaPadula rules and reverses them, showing how confidentiality and integrity are often at odds. If you understand Bell-LaPadula (no read up; no write down), you can extrapolate Biba by reversing the rules: “no read down”; “no write up.
What are the components of the Graham-Denning model?
Graham-Denning Model – uses Objects, Subjects, and Rules.
What are the 8 rules that a subject can execute on an object in the Graham-Denning model?
The 8 rules that a specific subject can execute on an object are:
- Transfer Access.
- Grant Access.
- Delete Access.
- Read Object.
- Create Object.
- Destroy Object.
- Create Subject.
- Destroy Subject.
What is the Clark Wilson model?
Clark-Wilson is a real-world integrity model that protects integrity by requiring subjects to access objects via programs. Because the programs have specific limitations to what they can and cannot do to objects, Clark-Wilson effectively limits the capabilities of the subject. Improves integrity
What is the Brewer-Nash model?
The Chinese Wall model (also known as Brewer-Nash) is designed to avoid conflicts of interest by prohibiting one person, such as a consultant, from accessing multiple conflict of interest categories
What is the non-interference model?
Non-Interference Model:
- Ensures that any actions that take place at a higher security level do not affect, or interfere with, actions that take place at a lower level.
- The model is not concerned with data flow, but with what a subject knows about the state of the system.
- Any changes by a higher level subject, will never be noticed by a lower level subject.
What is the Take-Grant protection model?
Take-Grant Protection Model:
- Uses rules that govern the interactions between subjects and objects.
- It uses permissions that subjects can grant to (or take from) other subjects.
What are the 4 rules of the Take-Grant protection model?
- Take rule allows a subject to take rights of another subject.
- Grant rule allows a subject to grant own rights to another subject.
- Create rule allows a subject to create new objects.
- Remove rule allows a subject to remove rights it has over another object.
What is an access control matrix?
An access control matrix is a table that defines the access permissions that exist between specific subjects and objects. A matrix is a data structure that acts as a lookup table for the operating system. The table’s rows, or capability lists, show the capabilities of each subject. The columns of the table show the access control list (ACL) for each object or application.
What are the six frameworks of the Zachman Framework? What rules do those six frameworks map to?
Zachman Framework (for Enterprise Architecture):
- Provides six frameworks:
- What, How, Where, Who, When, and Why.
- Mapping those frameworks to rules for:
- Planner, Owner, Designer, Builder, Programmer, and User.
What must all users have in the dedicated security mode?
Dedicated security mode - All users must have:
- Signed NDA for ALL information on the system.
- Proper clearance for ALL information on the system.
- Formal access approval for ALL information on the system.
- A valid need to know for ALL information on the system.
What must all users have in the system high security mode?
System high security mode - All users must have:
- Signed NDA for ALL information on the system.
- Proper clearance for ALL information on the system.
- Formal access approval for ALL information on the system.
- A valid need to know for SOME information on the system.
- All users can access SOME data, based on their need to know
What must all users have in the compartmented security mode?
Compartmented security mode - All users must have:
- Signed NDA for ALL information on the system.
- Proper clearance for ALL information on the system.
- Formal access approval for SOME information they will access on the system.
- A valid need to know for SOME information on the system.
- All users can access SOME data, based on their need to know and formal access approval.
What must all users have in the multilevel security mode?
Multilevel security mode - (Controlled Security Mode) - All users must have:
- Signed NDA for ALL information on the system.
- Proper clearance for SOME information on the system.
- Formal access approval for SOME information on the system.
- A valid need to know for SOME information on the system.
- All users can access SOME data, based on their need to know, clearance and formal access approval.
What is IAAS?
IaaS - (Infrastructure as a Service) The vendor provides infrastructure up to the OS, the customer adds the OS and up.
What is abstraction?
Abstraction hides unnecessary details from the user. It collects similar elements into groups classes or roles that are assigned security controls, restrictions or permissions.
What is a security domain?
A security domain is the list of objects a subject is allowed to access
What is the ring model?
The ring model is a form of central processing unit (CPU) hardware layering that separates and protects domains, such as kernel mode and user mode, from each other. The innermost ring is the most trusted, and each successive outer ring is less trusted. Processes communicate between the rings via system calls, which allow processes to communicate with the kernel and provide a window between the rings
What are the four rings within the ring model?
The rings are (theoretically) used as follows:
• Ring 0: Kernel
• Ring 1: Other OS components that do not fit into Ring 0
• Ring 2: Device drivers
• Ring 3: User applications
most x86 operating systems, including Linux and Windows, use Rings 0 and 3 only
What is pipelining?
Pipelining combines multiple CPU steps into one process, allowing simultaneous FDX and write steps for different instructions.
What is an interrupt?
An interrupt indicates that an asynchronous event has occurred. A CPU interrupt is a form of hardware interrupt that causes the CPU to stop processing its current task, save the state, and begin processing a new request. When the new task is complete, the CPU will complete the prior task.
What is a trusted platform module?
A trusted platform module (TPM) chip is a processor that can provide additional security capabilities at the hardware level
What does a TPM chip allow for and what is it used for?
The TPM chip allows for hardware-based cryptographic operations. Security functions can leverage the TPM for random number generation; the use of symmetric, asymmetric, and hashing algorithms; and secure storage of cryptographic keys and message digests. The most commonly referenced use case for the TPM chip is ensuring boot integrity. By operating at the hardware level, the TPM chip can help ensure that kernel-mode rootkits are less likely to be able to undermine operating system security. In addition to boot integrity, TPM is also commonly associated with some implementations of full disk encryption.
What is a covert channel?
A covert channel is any communication that violates security policy
What is a backdoor?
A backdoor is a shortcut in a system that allows a user to bypass security checks, such as username/password authentication, to log in