GRC Concepts Flashcards
Information Flow model
A model that focuses on the flow of information to ensure that security is maintained and enforced no matter how information flows.
Noninterference model
A model that seeks to ensure that objects and subject of different levels don’t interfere with objects and subjects of other levels. The noninterference model can be used to avoid convert channel attacks.
Lattice Model
Subjects are assigned security clearances. Objects are assigned security labels.
Take-Grant model
A model that dictates how rights can be passed from one subject to another or from a subject to an object
Bell–LaPadula model
A confidentiality focused security model built on a state machine model employing no read up, no write down mandatory access controls.
Biba model
An integrity focused security model employing no read down, no write up mandatory access controls.
Simple Security Axiom
Subjects cannot read information at a higher classification level (no read up)
Star Security Axiom
Subjects cannot write information at a lower classification level (no write down)
Simple Integrity Axiom
subjects cannot read information at a lower classification (no read down)
Star Integrity Axiom
subjects cannot write information at a higher classification (no write up)
Clark-Wilson model
An integrity focused security model enforced through well-formed transactions. It uses a relationship of subject, program and object. Subjects do not have direct access to objects. Objects must be accessed through programs.
Brewer and Nash model (aka Chinese Wall)
A security model designed to avoid conflicts of interest. It creates a conflict class that defines which security domains are potentially in conflict and prevents any subject with access to one domain that belongs to a specific conflict class from accessing other domains that belong to the same conflict class.
Graham–Denning model
A security model focused on the secure creation and deletion of both subjects and objects.
Fourth Amendment
Protection from unreasonable search and seizure by the government.
Computer Fraud and Abuse Act (CFAA)
A US law enacted in 1984 to exclusively cover computer crimes that cross state boundaries to avoid infringing on states’ rights.