Security Models Flashcards
Review IT Security Models
Key features of Bell-LaPadula
Focuses on Confidentiality Is Mandatory Access Tuple Subject-Object Is Lattice-Based Relies on State Machine Is an Information Flow Model
Simple Security Property: NO READ UP
* Security Property: NO WRITE DOWN
Discretionary Security Property
DOES NOT ADDRESS “NEED TO KNOW”
Features of Biba
Focuses on Integrity Is Mandatory Access Tuple Subject-Object Is Lattice-Based Relies on State Machine Is an Information Flow Model
Simple Integrity Property: NO READ DOWN
* Integrity Property: NO WRITE UP
FIRST GOAL OF INTEGRITY
-Prevent data modification by unauthorized parties
Features of Clark-Wilson
Focuses on Integrity Is Discretionary Access Triple Subject-Program-Object NOT Lattice-Based DOES NOT Rely on State Machine Is NOT an Information Flow Model
Well-formed transactions
Separation of duties
ALL THREE GOALS OF INTEGRITY
- Prevent data modification by unauthorized parties
- Prevent unauthorized data modification by authorized parties
- Maintain internal and external consistency (i.e. data reflects the real world)
Features of Brewer and Nash
Focuses on Confidentiality Is Discretionary Access Tuple Subject-Object NOT Lattice-Based DOES NOT Rely on State Machine Is an Information Flow Model
Chinese wall
Mutual exclusivity
Prevent conflict of interest
Features of Goguen-Meseguer
Focuses on Integrity
Noninterference model
Based on predetermining the set or domain - the list of objects that a subject can access
Subjects are unable to interfere with each other’s activities
Features of Sutherland
Focuses on Integrity
Prevents interference
Relies on Formal State Machine
Is an Information Flow Model
Defines:
- System states
- Initial states
- State transitions
Prevents use of covert channels
Features of Graham-Denning
Focuses on secure creation and deletion of subjects and objects
8 primary protection rules:
- Securely create an object
- Securely create a subject
- Securely delete an object
- Securely delete a subject
- Securely provide the read access right
- Securely provide the grant access right
- Securely provide the delete access right
- Securely provide the transfer access right