Sybex Chp 8 Flashcards
This access control model ensures that all instances of subjects accessing objects are secure.
State Machine Model
Take-Grant Model
Graham-Denning
Sutherland
Clark-Wilson
Bell LaPadula
Biba
Noninterference Model
Information Flow Model
Goguen-Meseguer
Access Control Matrix
State Machine Model
This access control model is designed to prevent unauthorized, insecure, or restricted information flow.
State Machine Model
Take-Grant Model
Graham-Denning
Sutherland
Clark-Wilson
Bell LaPadula
Biba
Noninterference Model
Information Flow Model
Goguen-Meseguer
Access Control Matrix
Information Flow Model
This access control model prevents the actions of one subject from affecting the system state or actions of another subject.
State Machine Model
Take-Grant Model
Graham-Denning
Sutherland
Clark-Wilson
Bell LaPadula
Biba
Noninterference Model
Information Flow Model
Goguen-Meseguer
Access Control Matrix
Noninterference Model
This access control model dictates how rights can be passed from one subject to another or from one subject to an object.
State Machine Model
Take-Grant Model
Graham-Denning
Sutherland
Clark-Wilson
Bell LaPadula
Biba
Noninterference Model
Information Flow Model
Goguen-Meseguer
Access Control Matrix
Take-Grant Model
This access control model indicates the actions or functions that each subject can perform on each object.
State Machine Model
Take-Grant Model
Graham-Denning
Sutherland
Clark-Wilson
Bell LaPadula
Biba
Noninterference Model
Information Flow Model
Goguen-Meseguer
Access Control Matrix
Access Control Matrix
In this access control model the subjects have a clearance level that allows them to access only those onjects with the corresponding classification levels. This enforces confidentiality.
State Machine Model
Take-Grant Model
Graham-Denning
Sutherland
Clark-Wilson
Bell LaPadula
Biba
Noninterference Model
Information Flow Model
Goguen-Meseguer
Access Control Matrix
Bell LaPadula
In this access control model prevents subjects with lower security levels from writing to objects with higher security levels.
State Machine Model
Take-Grant Model
Graham-Denning
Sutherland
Clark-Wilson
Bell LaPadula
Biba
Noninterference Model
Information Flow Model
Goguen-Meseguer
Access Control Matrix
Biba
This access control model relies on auditing to ensure that unauthorized subjects cannot access objects and that authorized users access objects properly.
State Machine Model
Take-Grant Model
Graham-Denning
Sutherland
Clark-Wilson
Bell LaPadula
Biba
Noninterference Model
Information Flow Model
Goguen-Meseguer
Access Control Matrix
Clark-Wilson
These two access control models enforce integrity while these two access control models focus on integrity.
State Machine Model
Take-Grant Model
Graham-Denning
Sutherland
Clark-Wilson
Bell LaPadula
Biba
Noninterference Model
Information Flow Model
Goguen-Meseguer
Access Control Matrix
Enforce: Biba, Clark-Wilson Focus: Goguen-Meseguer, Sutherland
This access control model focus on secure creation and deletion of both subjects and objects.
State Machine Model
Take-Grant Model
Graham-Denning
Sutherland
Clark-Wilson
Bell LaPadula
Biba
Noninterference Model
Information Flow Model
Goguen-Meseguer
Access Control Matrix
Graham-Denning
Allows a process to read and write to only certain memory locations and resources
Bounds
Confinement
Isolation
Confinement
Consist of limits set on memory addresses and resources a process can access.
Isolation
Confinement
Bounds
Bounds
It is the responsibility of the __________ to enforce logical bounds and disallow access to other processes.
Operating System
When a process is confined through enforcing access bounds.
Bounds
Isolation
Confinement
Isolation
This ensures that any behavior will affect only the memory and resources associated with the process.
Bounds
Confinement
Isolation
Isolation
True / False Physically bound memory can be very expensive but it’s more secure than logical bounds.
True
An assessment of the reliability and usability of security features in a real-world situation.
Assurance
This maintains a row of security attributes for each controlled object
Capabilities List
An Access Control Matrix is a table of subjects and objects and indicates the actions that each subject can perform on each object.
–Each column is an ACL (tied to the object)
——Easier to manage
–Each row is a Capabilities List (tied to the Subject)
——More diffidult to manage
A table of subjects and objects that indicate the actions or functions that each subject can perform on each object.
Access Control Matrix
An Access Control Matrix is a table of subjects and objects and indicates the actions that each subject can perform on each object.
–Each column is an ACL (tied to the object)
——Easier to manage
–Each row is a Capabilities List (tied to the Subject)
——More diffidult to manage
Columns in an Access Control Matrix are known as:
ACL
An Access Control Matrix is a table of subjects and objects and indicates the actions that each subject can perform on each object.
–Each column is an ACL (tied to the object)
——Easier to manage
–Each row is a Capabilities List (tied to the Subject)
——More diffidult to manage
ACLs are tied to the: Subject Object
Object
An Access Control Matrix is a table of subjects and objects and indicates the actions that each subject can perform on each object.
–Each column is an ACL (tied to the object)
——Easier to manage
–Each row is a Capabilities List (tied to the Subject)
——More diffidult to manage
True or False ACLs list the valid actions each subject can perform on an object.
True An Access Control Matrix is a table of subjects and objects and indicates the actions that each subject can perform on each object. –Each column is an ACL (tied to the object) ——Easier to manage –Each row is a Capabilities List (tied to the Subject) ——More diffidult to manage
Capabilities List are tied to the: Subject Object
Subject An Access Control Matrix is a table of subjects and objects and indicates the actions that each subject can perform on each object. –Each column is an ACL (tied to the object) ——Easier to manage –Each row is a Capabilities List (tied to the Subject) ——More diffidult to manage
Rows in an Access Control Matrix are known as:
Capabilities List