TCSEC Levels Flashcards

1
Q

What are the TCSEC Categories?

A

A: Verified protection
B: Mandatory Protection
C: Discretionary Protection
D: Minimal Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between D and C1 security?

A

C1 controls access by user IDs and groups. There are some protocols that limit object access, but protection is weak.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between C1 and C2 security?

A

Users must be individually identified to gain access to objects.

Enforces media cleansing.

Strict login procedures that restrict access to invalid or unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What model are Category B systems based on?

A

Bell-LaPadula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What requirement does B1 impose?

A

Every subject and object must have a security label. Sufficient for classified data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What requirements do B2 systems impose?

A

No covert channels may exist.

Operator and administrator functions are separated.

Process isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What requirements do B3 systems impose?

A

Administration functions are clearly defined and separate from functions available to other users.

Secure state must be addressed during the boot process.

Sufficient for very sensitive or secret data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What requirements do A1 systems impose?

A

Each phase of the development cycle is controlled using formal methods.

Verified system design.

Top secret data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What TCSEC level is verified protection?

A

A1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What TCSEC category is based on Bell LaPadula?

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

At what TCSEC category does the restriction that no covert channels exist begin?

A

B2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

At what TCSEC level does the restriction that operator and administrator fu8nctions must be separated begin?

A

B2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

At what TCSEC level does the restriction that process isolation must occur begin?

A

B2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

At what TCSEC level are users individually identified to gain access to objects?

A

C2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

At what TCSEC level is media cleansing required?

A

C2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

At what TCSEC level are strict login procedures that restrict access to invalid or unauthorized users required?

A

C2

17
Q

At what TCSEC level must administration functions be clearly defined and separate from user functions?

A

B3

18
Q

At what TCSEC level must secure state be addressed at boot time?

A

B3

19
Q

What TCSEC level is sufficient for very sensitive or secret data, but not top secret?

A

B3

20
Q

Which TCSEC level requires that every object and subject have a security label?

A

B1

21
Q

Which TCSEC level is sufficient for classified data?

A

B1