Security Architecture and Engineering Flashcards

1
Q

Which aspect of the CIA triad is the Bell-LaPadula model concerned with

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three properties of the Bell-LaPadula model

A

Simple security property - no read up
* Security property - no write down
Strong * property - no read or write up and down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of access control does the Bell-LaPadua model apply to

A

Mandatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which aspect of the CIA triad is the BIBA model concerned with

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of access control does the BIBA model apply to

A

Mandatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the axioms and properties of the BIBA model

A

The Simple Integrity Axiom states that a subject at a given level of integrity must not read data at a lower integrity level (no read down).
The * (star) Integrity Axiom states that a subject at a given level of integrity must not write to data at a higher level of integrity (no write up).[3]
Invocation Property states that a process from below cannot request higher access; only with subjects at an equal or lower level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of access control is Lattice based access control

A

Mandatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is LBAC

A

Lattice based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What access does a subject with Top Secret {crypto, chemical} have?
What access does a subject with Top Secret {chemical} have

A

Everything
Only {Chemical} in secret and top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Graham-Denning model uses what three concepts

A

Objects, Subjects and Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the Graham-Denning Model what are the 8 rules

A

Transfer, Grant and Delete ACCESS (3)
Read create and destroy OBJECT (3)
Create and Destroy SUBJECT (2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the HRU

A

Harrison Ruzzo Ullman model - an operating system level computer security model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is the HRU different from the Graham-Denning Model

A

Considers Subjects to be Objects too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the six primitive operations of the HRU

A

Create (object or subject)
Destroy (object or subject)
Add right to access matrix
Remove right from access matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What aspect of the CIA triad does the Clark-Wison model focus on

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This security model separates users from the back-end data through “Well-formed transactions and “Separation of Duties”

A

Clark-Wilson Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What concepts does the Clark-Wilson model use

A

Subject/Program/Object

18
Q

In the Clark Wilson model what are well formed transactions

A

A series of operations that transition a system from one consistent state to another consistent state

19
Q

Which model prohibits information flow between subjects and objects that would create a conflict of interest

A

Brewer-Nash

20
Q

Which model ensures that any actions that take place at a higher security level do not affect or interfere with actions that take place at a lower level

A

Non-Interference model

21
Q

What are security modes

A

Mandatory access control (MAC)
Discretionary Access Control (DAC)

22
Q

Using fixed-length sequences of input plaintext symbols as the unit of encryption

A

Block Mode Encryption

23
Q

Size in symbols (usually bits or bytes) for a particular block mode encryption algorithm or process

A

Block size

24
Q

The study of techniques for attempting to defeat cryptographic techniques and, more generally, information security services

A

Cryptanalysis

25
Q

The science that deals with hidden, disguised, or encrypted communications, files, or other information. It consists of both cryptography and cryptanalysis

A

Cryptology

26
Q

The complete set of hardware, software, communications elements, and procedures that allows parties to communicate, store information, or use information that is protected by cryptographic means. The system includes the algorithm, key, and key management functions, together with other services that can be provided through cryptography.

A

Cryptosystem

27
Q

One or more parameters that are inherent to a particular cryptographic algorithm and its implementation in a cryptosystem.

A

Cryptovariable(s)

28
Q

The process and act of converting the message from its plaintext to ciphertext. Sometimes it is also referred to as enciphering.

A

Encryption

29
Q

A form of cryptanalysis that uses the frequency of occurrence of letters, words, or symbols in the plaintext alphabet as a way of reducing the search space.

A

Frequency Analysis

30
Q

A system that uses both symmetric and asymmetric encryption processes.

A

Hybrid Encryption System

31
Q

Refers to transmitting or sharing control information, such as encryption keys and cryptovariables, over the same communications path, channel or system controlled or protected by that information.

A

In-Band

32
Q

A process of reconstructing an encryption key from the ciphertext alone, such as when the original key has been corrupted, lost, or forgotten. Requires a known way of reverse-engineering the algorithm (i.e., a successful means of conduction a ciphertext-based attack).

A

Key recovery - but if you can do it, then it was not safe

33
Q

Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.

A

Key space

34
Q

A security model that ensures that objects and subjects at one level of sensitivity don’t inappropriately interact with the objects and subjects at other levels. Each data access attempt is independent of all others and approved, if appropriate, by the security architecture.

A

Non-interference Model

35
Q

System elements that are used to provide a value chosen over a key space, such that on successive uses of the function the values returned will have as close to a near-perfect random distribution over that key space as possible.

A

Random and Pseudorandom Number Generators

36
Q

A symmetric encryption key generated for one-time use, such as during a specific internet connection session.

A

Session key

37
Q

A system using a process that treats the input plaintext as a continuous flow of symbols and encrypts one symbol at a time.

A

Stream mode encryption system

38
Q

The process of exchanging one letter orbit in an input plaintext (and its alphabet) for another symbol in the output alphabet.

A

Substitution

39
Q

An encryption or decryption process using substitution.

A

Substitution Cipher

40
Q

The process of reordering the plaintext to hide its meaning

A

Transposition or permutation

41
Q

An encryption or decryption process using transposition.

A

Transposition cipher

42
Q

The amount of effort necessary to break a cryptographic system, usually measured in total elapsed time

A

Work factor