Security Models Flashcards

1
Q

What is a policy?

A

Set of rules and practices governing how a system will manage and protect data with special regard to sensitive objects.

Can be considered as a legal document, especially when defined in a security policy document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a reference monitor fit into a security model?

A

Mechanism or abstract concept that define how the policies are applied to the system, data and users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the security kernel do in security models?

A

Supervises low-level system activities that access resources such as registers and enforces policies?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a security model?

A

High-level description of the rules that a security policy should implement. Usually an overarching guide including how flow of information between subjects and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should be defined in a security model?

A

Explicitly describes what entities are covered by the model, and may include data structures and cryptographic specifications.

Should outline possible threats, data ccess rules and who is a valid user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is the relationship between objects and relationships defined?

A

Both have levels of classifications that need to have access control defined.
IE: Subjects: Privates (0), NCO’s(1)…
Objects: Unclassified(0), Confidential(1)…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can a subject read?

A

Anything at their level of clearance or lower, but may write to anything at their level or higher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why does the linear model not work?

A

It is inflexible and simplistic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a poset?

A

A partial ordering on a set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is comparable in a poset?

A

Not every pair of elements needs to be comparable, distinct sets on the same level are incomparable but it does show hierarchy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is domination?

A

Subject having higher access to resources or indicates the direction of information flow.

One or none of the elements in a comparison can dominate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the hierarchical/military model

A

If a <= b then a is dominated by b, the system low is the level dominated by all others.

System High is the one that dominates everything else.

A dominates B iff A can perform everything that B can.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is compartmentalisation?

A

Restrict access to contents based on clearance and what you’re working on.

Codewords are the compartment, with classifications and codewords forming a lattice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Bell-LaPadula model?

A

BLP goal is to identify allowable communication while maintaining secrecy.

Secret information can’t flow downwards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an SS-property in the BLP model?

A

Simple security policy, no process can read data at a higher level. NRU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a *-property in the BLP model?

A

No process can write down to a lower level. NWD.

Stop’s sensitive data being given to those at a lower level.

17
Q

What are the drawbacks of the BLP model?

A

HIgh-level subject can’t inform lower-level subject of the information, meaning that they need to downgrade to the subject level or identify subjects to break the *-property.

18
Q

What is a ds-property in BLP?

A

DAC is enforced to allow this through an ACL (allowed users are designated alongside the file.)

19
Q

Why is the BLP model like a state machine and how can we verify it’s security?

A

The BLP model is like a state machine as it has valid states (properties) and the transitions (write-to subjects etc). This is useful as if the state system is secure, and the initial state is secure, then the system is secure.

20
Q

What is the Chinese Wall?

A

Reflects protection requirements for commercial information

21
Q

What are the units used in the Chinese Wall?

A

Objects: Files, low-level information pertaining to one company

Groups: All objects pertaining to one company are grouped

Conflict classes: All groups of objects for competing companies are clustered together

22
Q

When can a subject access any information?

A

As long as they have not accessed any information from a different company in the same conflict class.

Keeps entities from viewing info on competing entities.

23
Q

When can an object be made public?

A

When C(object) = empty set. That is, the information has been sanitised and is no longer useful to competitors.

24
Q

How are the accesing of objects traced?

A

Subjects who have viewed the data are noted in a matrix Ns,o where Ns,o is true iff access has been granted to an object at one time.

25
Q

What is the ss-property of the Chinese Wall?

A

Subject will be permitted access to an object o if o is sanitised or if the user hasn’t accessed another object in the competitor set.

26
Q

What is the *-property of the Chinse Wall?

A

Subject is granted write access to an object is the subject has had no read access to an object in the same competitor set.

27
Q

When are access rights checked in a Chinese wall?

A

On each access, as they change when a user accesses an object.

28
Q

What is the Clark-Wilson model?

A

Used when confidentiality and integrity are equaly is important. Implements a set of transactions policies.

Data is manipulated by a specific set of programs
Users have to collaborate to manipulate data and collude to penetrate security
Users are restricted in what they can execute.
There is an audit trail of transactions
There is a certification procedure

29
Q

What is included in the transactions as per the Clark-Wilson model?

A

User Id
Transaction Procedure
Data items operated on

30
Q

What do well-formed transactions appear like?

A

A series of operations taking the system state from one consistent state to another.