Security Engineering (ch 6-10) Flashcards
What role does a reference monitor play in a TCB (Trusted Computing Base) security model
The reference monitor validated access to to every resource prior to granting access requests
Most of the higher-order security models, such as Bell-LaPadula and Biba, are based on which model?
state machine model
The Clark-Wilson access control model was designed to protect what aspect of security?
integrity
The Clark-Wilson access model is also called a(n) ___________________ interface model
The Clark-Wilson model can also be described as a restricted interface model because it uses classification-based restrictions to offer subject-specific functions and information. Subjects at one classification level will see a specific set of data and obtain access to a related set of functions, while another subject at a different classification level will see a different dataset and obtain access to a different set of functions.
The Bell-LaPadula access control model was designed to protect what aspect of security?
The Bell-LaPadula model is focused on maintaining the confidentiality of objects. Bell-LaPadula does not address the aspects of object integrity or availability.
What type of processing makes use of a multithreading technique at the operating system level?
Symmetric multiprocessing systems implement multithreading techniques at the operating system level.