Security Architecture and Engineering Flashcards
What are the types of security model
Mandatory Access Control (MAC) Modes of Operation Confidentiality: Bell-LaPadula Integrity: Biba Lattice Commercial: Clark-Wilson
What is Mandatory Access Control (MAC)
Read down, write up
can only access object if the subject clearance is equal to or greater than the object’s label (Top Secret, Secret, etc..)
What are the four types of Modes of Operation
Dedicated
System High
Compartmented
Multilevel
What is Dedicated mode of operation
only contains object of one classification label (e.g. Top Secret)
Need to have clearance of equal to or higher to access the object
What is System High mode of operation
contains mixture of labels (confidential, secret, top secret)
Need to have clearance of the highest object
What is Compartmented mode of operation
all subjects have necessary clearance but don’t have formal access approval or Need to Know
Uses technical control to enforce need to know vs policy basis need to know
Formal access approval for SOME information they will access on the system.
A valid need to know for SOME information on the system.
All users can access SOME data, based on their need to know and formal access approval.
What is Multilevel mode of operation
stores objects at different labels
allow access by subject with different clearances
What is Bell-Lapadula security model
Confidentiality
No Reads up
No Write Downs
What is Bell-Lapadula - Strong
Stuck at level
Can only perform operations at that level
What are the 2 types of Bell-Lapadula tranquillity
Weak Tranquility property - the label of the subject and the object can’t change to violate defined security policy
Strong Tranquility property - label never change during operations
What is Biba security model
Integrity (think of time, isn’t confidential, but requires integrity)
No read downs, no write up
Which security model deal with integrity
All the model contains the letter I
Biba
Clark-Wilson
Non-Interference
What is Lattice security model
Confidentiality
Deals with data flow
No read up, no write down
What is the Clark-Wilson model
internal/external consistency
Authorized users cannot make unauthorized changes
Separation of duties
What is the State Machine model
Captures current security posture
Test all paths
What is the Research model
used to research the best security posture
Information Flow Model, Bell-Lapadula is one of them
Non-interference - High level action does not determine low level user visibility (NSA and pizza story)
What is the Chinese Wall model
No information flow is allowed that could cause information leakage that could lead to conflict of interest
Treat them as separate companies
aka Brewer Nash
What is Trusted Computing Base (TCB)
all components are properly implemented and secure
What is a Reference Monitor
Mediates all access between object and subjects
Checks to ensure they are authorized to view/access objects
What is Domain Separation
group of object with same security requirement
e.g. Top Secret object, HR department
What is COI
Conflict of Interest
What are the 3 types of Domain Separation
Execution Rings
Base Address Registers
Segment Descriptors
What are the 4 Orange Book classes
A. Verified Protection (MAC +
B. Mandatory Protection (Mandatory Access Control)
C. Discretionary Protection (Discretionary Access Control)
D. Minimal Protection (e.g your laptop)
What are the key principles of The Orange Cook
Functionality - how well does it operate
Effectiveness - how secure is it
Assurance - can we prove it is secure
Lifecycle assurance -
What is ITSEC F1-F5
Mirror functionality of The Orange Book
What is ITSEC F6
High Integrity Requirement
What is ITSEC F7
High Availability
What is ITSEC F8
High integrity for communication
What is ITSEC F9
High confidentiality
What is ITSEC F10
High confidentiality and integrity for data network
Target of Evaluation (TOE)
System or product being evaluated
Security Target (ST)
documentation describing TOE, including security requirements and operational environment
Protection Profile
independent set of security requirements for specific product or system
e.g. Fire, IDS
Evaluation Assurance Level (EAL)
Evaluation score of the tested product
EAL 1
Functionally tested
EAL 2
Structurally tested
EAL 3
Methodically tested and checked
EAL 4
Methodically designed, tested, and checked
EAL 5
Semi-formally designed and tested
EAL 6
Semi-formally verified, designed, and tested
EAL 7
Formally, verified, designed, and tested
What are the 2 parts of the CPU
Arithmetic Logic Unit (ALU)
Control unit
What is Fetch-Decode-Execute cycle
Fetch - retrieves information
Decode - understand the instructions
Execute - instructions executed and stored in a register
Fetch-Decode-Execute (no pipeline)
Sequential
Book 3.3 slide #4
Fetch-Decode-Execute (pipeline)
Pipeline is hardware
Instead of doing it one at a time, can do multiple
Book 3.3 slide #4
Complex-Instruction-Set-Computer (CISC)
Long command
x86 CPU
Reduced-Instruction-Set-Computer (RISC)
Short command
ARM CPU
What is multitasking
Multiple tasks concurrently on one CPU
Heavy Weight - each has own copy of dll
What is multithreading
multiple threads concurrently on one CPU
Light weight, point to a copy of the dll
What is multiprocessing
multiple task at the same time with multiple CPU
What are the 3 types of Memory Protection
Process Isolation
Address Space Layout Randomization (ASLR)
Non eXecutable (NX) Stack
Process Isolation
prevents one process from affecting another
Address Space Layout Randomization (ASLR)
randomizes address used by programs
Non eXecutable (NX) Stack
marks pages of the stack non executable
Virtual memory
swapping memory to disk
think disk paging (oldest on disk, newest in RAM)
doesn’t correspond directly to physical memory
Threads use virtual address
Direct Addressing (memory addressing)
exact location in memory to execute
Indirect Addressing (memory addressing)
pointer to location in memory to execute
Register Direct Addressing (memory addressing)
refer directly to specific register that already contains the data.
Register are temp storage for the task teh CPU works on at that instant
Register Indirect Addressing (memory addressing)
pointer - looks for specified register
Register are temp storage for the task teh CPU works on at that instant
Index Addressing (memory addressing)
Memory location plus offset
Think of an array
Layering (OS)
Think OSI model
Works with layer above and below it and work independently. If one layer fails, should not affect other other layer
Abstraction (OS)
Think of saving file
reduce complexity and hide the inner working of the system
What are the 4 layer of Ring Layers of CPU
Ring 3: Applications and utilities
Ring 2: I/O drivers and utlities
Ring 1: OS component not part of kernel
Ring 0: Kernel
All modern OS, only uses ring 0 and 3
Trust Platform Module (TPM)
think of motherboard. TPM use to authenticate integrity of the BIOS
**Full disk encryption, if you don’t have TPM can’t decode to use it.
Hypervisor
runs on the host, controlling the VM and their access to the hardware.
What is full virtualization
run unmodified applications or OS designed to run directly on computer hardware
What is Paravirtualization
runs specially modified applications or OS
Unique requirements for VM
**Protect Hypervisor - Must remain secure!!!
Protect special host (such as drag and drop)
What is a database
collection of related data intended for sharing
What is Database Management System (DBMS)
Stores data and provides operation CRUD and search
What are the 4 types of data model
Hierchial
Mesh
Object-Oriented
Relational
Semantic Integrity
Wrong data type
Entity Integrity
Primary key
Referential Integrity
Foreign key
Concurrency
locking so two users can’t update at the same time
Commit
writes changes to DB
2-Phase commit
distributed DB, if commit cannot happen on all db, rollback changes
Checkpoint
snapshot of database
Database Journal
log file of db changes in real time
Data Warehouse
used for queries, does not affect current system
Data Mining
looking for something wrong, fraud
Aggregation
example - download the entire phone book
iterate through the entire collection to get all the info
Inferences
able to find out information of high level from lower level
What is Inference Controls
Enforced during query processing (think of CIA and pizza)
Content-Depended access rules (think of phone book and asking for more than 5 at a time)
Shadow database
Active - Passive
2 database, 1 mirrors the other. Only one takes the transaction.
What is active-active db
Two DB synch, both writing transactions
What is active-passive
Two DB synch, one mirrors the other and only one writes transactions
What is an applet
Functions w/o sending users request back to the server
Remote code exec on client, additional risk