Security Models Flashcards
Bell La Padula
Mandatory Access Control
Focused on Confidentiality
TCSEC B1
Bell La Padula - Simple Security
Cannot Read Up
Bell La Padula - *Security
No Write down
Bell La Padula - Strong*
Only access data at own level (no read/write up or down)
BIBA
Mandatory Access Control
Focused on Integrity
BIBA Simple Integrity
No Read Down
BIBA *Integrity
No Write Up
BIBA Invocation
No read or write up
Lattice Based Access Control (LBAC)
MAC
subject can have multiple access
Graham Denning Model
Uses Objects, subjects and rules
focused on relationship between subjects and objects
Clark Wilson
Integrity Model
Focus on seperation of duties and Well formed transactions (one consistent state to another consistent state)
Brewer Nash
Chinese wall or Info Barriers
provide controls that mitigate conflict of interest
no info flow that could create conflict of interest
Take-Grant
Uses rules that govern interaction between subjects and objects
- Take - take rights of another object
- grant - grant own rights to an object
- create - create new rights
- remove - remove rights it has
Lipner Model
Bell La Padula + BIBA
Non interference model
Actions taken place at higher level does not affect lower levels. Any change at higher level will not be noticed
Zachman framework
Maps a matrix of Who, what where, when, how and why
Map to - planner, owner, designer, builder, programmer, user
TCSEC
Orange Book - Trusted Computer Security Evaluation Criteria
A- MAC; Formal, verified protection
B3 - MAC; Security domain (trusted recovery, Monitor event and notification
B2 - MAC; Structured protection (trusted path, covert channel analysis). Separate operator/admin roles. Configuration management
B1 - MAC; (security labels) based on Bell LaPadula security model. Labeled security (process isolation, devices
C2 - DAC; Controlled access protection (object reuse, protect audit trail).
C1 - DAC; (identification, authentication, resource protection).
D- minimal protection, any systems that fails higher levels
ITSEC
First international security model based on TCSEC 1 = D 2= C1 3 = C2 4 = B1 5 = B2 6 = B1 7 = A