Security Models Flashcards
Clark-Wilson Security Model
Authentication/Accessability (A in Clark for Authentication) - Seperation of Duties MUST be enforced. KEY words to look for: Transformation, Unconstrained, Integrity Verification, Prevent unauthorized changes
Bell-LaPadula Model
Confidentiality - access matrix such as No Read Up, No Write down policy
Biba Model
Integrity (I in Biba for integrity)
What is a Lattice Model
mathmatical structure that defines greatest lower-bound and lowest upper-bound values for a pair of elements like subject and object. Assocaited with MAC
Capabilities List
Maintains a row of security attributes for each controlled object
Meaning of * (star) integrity in the Biba Model?
No Write Up
Meaning of Strong * (star) in the Bell-LaPadula
You can read and write up, restricted to info at their own level
Meaning of * (star) in Bell-LaPadula Model
can write up, but not read. Example: employees are required to provide input on a joint document that leadership sees. Leadership sees results of combined employee contributions but employees cannot see the combined document.
Lipner Model
Confidentiality AND integrity: assigns roles and each role assigned to specific domain. Cannot modify outside their domain.
Brewer-Nash (Chinese Wall) Model
Prevent conflict of interest by not allowing users to access confidential info of client organization and competitors.
Graham-Denning Model
Subjects and objects are created, assigned rights and privileges. Prevent subjects from gaining access to objects - “Invocation”
Harrison-Ruzzo-Ullman Model
Similar to Graham-Denning; Dealing with Invocation - prevention of subjects from gaining access to objects.