Security Models Flashcards
What is a policy?
Set of rules and practices governing how a system will manage and protect data with special regard to sensitive objects.
Can be considered as a legal document, especially when defined in a security policy document.
How does a reference monitor fit into a security model?
Mechanism or abstract concept that define how the policies are applied to the system, data and users.
What does the security kernel do in security models?
Supervises low-level system activities that access resources such as registers and enforces policies?
What is a security model?
High-level description of the rules that a security policy should implement. Usually an overarching guide including how flow of information between subjects and resources.
What should be defined in a security model?
Explicitly describes what entities are covered by the model, and may include data structures and cryptographic specifications.
Should outline possible threats, data ccess rules and who is a valid user.
How is the relationship between objects and relationships defined?
Both have levels of classifications that need to have access control defined.
IE: Subjects: Privates (0), NCO’s(1)…
Objects: Unclassified(0), Confidential(1)…
What can a subject read?
Anything at their level of clearance or lower, but may write to anything at their level or higher.
Why does the linear model not work?
It is inflexible and simplistic
What is a poset?
A partial ordering on a set
What is comparable in a poset?
Not every pair of elements needs to be comparable, distinct sets on the same level are incomparable but it does show hierarchy.
What is domination?
Subject having higher access to resources or indicates the direction of information flow.
One or none of the elements in a comparison can dominate.
What is the hierarchical/military model
If a <= b then a is dominated by b, the system low is the level dominated by all others.
System High is the one that dominates everything else.
A dominates B iff A can perform everything that B can.
What is compartmentalisation?
Restrict access to contents based on clearance and what you’re working on.
Codewords are the compartment, with classifications and codewords forming a lattice.
What is the Bell-LaPadula model?
BLP goal is to identify allowable communication while maintaining secrecy.
Secret information can’t flow downwards.
What is an SS-property in the BLP model?
Simple security policy, no process can read data at a higher level. NRU.