Udemy-Domain 3 Flashcards
ABAC stands for ___, and attributes could belong to ___ (3)
Attribute-Based Access Control;
subject (user - role, clearance..);
object (resource - owner, creation date…);
Environment (time, location, threat level)
RUBAC means ___, and is based on ___
Rule-Based Access Control; if, then statements
RBAC means ___
Role-Based Access Control
the ___ security model is Mandatory Access Control, and only concerned with the Confidentiality part of the CIA triad
Bell-LaPadula
the ___ security model is Mandatory Access Control and mainly focused on the Integrity part of the CIA triad
Biba
in the Bell-LaPadula security model,
the Simple Security Property is signified by ___,
the * Security Property by ___ and
the Strong * Property by ___
“No Read Up”;
“No Write Down”;
“No Read or Write Up and Down”
in the Biba security model,
the Simple Integrity Property is signified by ___,
the * Integrity Property by ___ and
the Invocation Property by ___
“No Read Down”;
“No Write Up”;
“No Read or Write Up”
LBAC means ___
Lattice Based Access Control
the ___ security model assigns permissions by security clearance and subject clearance
Lattice Based Access Control
the 8 rules of the Graham-Denning security model are:
- ___
- ___
- ___
- Read Object
- Create Object
- Destroy Object
- Create Subject
- Destroy Subject
- Transfer Access
- Grant Access
- Delete Access
the 8 rules of the Graham-Denning security model are:
- Transfer Access
- Grant Access
- Delete Access
- ___
- ___
- ___
- Create Subject
- Destroy Subject
- Read Object
- Create Object
- Destroy Object
the 8 rules of the Graham-Denning security model are:
- Transfer Access
- Grant Access
- Delete Access
- Read Object
- Create Object
- Destroy Object
- ___
- ___
- Create Subject
8. Destroy Subject
The HRU security model is an extension of the ___ model, but differs in that it ___
Graham-Denning; considers Subjects to be Objects too
the 6 primitive operations in the HRU security model are:
- Create Object
- Create Subject
- Destroy Object
- Destroy Subject
- Enter into access matrix
- Delete from access matrix
the ___ security model separates end users from the backend data through “well-formed transactions” and “separation of duties”
Clark-Wilson
While most security models describe a Subject/Object dynamic, the ___ model uses Subject/Program/Object
Clark-Wilson
in the Clark-Wilson security model, a ___ is a series of operations that transition a system from one consistent state to another consistent state
well-formed transaction
the ___ security model acknowledges that when a Subject accesses an Object, they are mediated by a Program which limits the interface
Clark-Wilson
the ___ security model is designed to mitigate conflict of interest in commercial organizations
Brewer-Nash (aka “Chinese Wall”)
the ___ security model creates an Information Barrier to ensure that actions at a higher security level are not noticed by a lower security level, to avoid interference
Brewer-Nash (aka “Chinese Wall”)
the 4 rules of the Take-Grant Protection Model are:
- Take (one subject can take rights from another)
- Grant (a subject can grant their rights to another)
- Create (a subject can create new objects)
- Remove (a subject can remove its rights over an object)
an Access Control Matrix is a table with columns for ___ and rows for ___. The cells indicate ___ for each subject toward each object
Objects; Subjects; Rights
The six columns/frameworks of the Zachman Framework are:
- What (data)
- How (function)
- Where (Network)
- Who (people)
- When (time)
- Why (motivation)
The six rows/roles of the Zachman Framework are:
- Planner
- Owner
- Designer
- Builder
- Programmer
- User
the Trusted Computer System Evaluation Criteria (TCSEC) was developed by the Department of Defense in the 1980’s and is commonly called ___ (no longer used for evaluating security systems)
the Orange Book
the currently used International Common Criteria for evaluating computer security products and systems is the ___
ISO/IEC 15408
in the ISO/IEC 15408 (International Common Criteria), the subject of the evaluation is called the ___,
the document identifying security criteria for a class of devices is called the ___,
and the properties of the thing being evaluated is called the ___
TOE (Target Of Evaluation)
PP (Protected Profile)
ST (Security Target)
in the ISO/IEC 15408 (International Common Criteria), the 7 levels a system or product could score is called it’s ___
Evaluation Assurance Level (EAL)
the 3 main Secure Systems Design Concepts are:
- Layering (separating hardware and software functionality)
- Abstraction (hiding unnecessary details from the user)
- Security Domains (groups of objects and subjects with similar security requirements)
the 3 main Security Domain concepts in Secure Systems Design are:
- Kernel/Supervisor mode vs User mode
- Open Standards vs Closed Standards (proprietary)
- The Ring Model that separates Users from the Kernel
the layers of the Ring Model in Secure Systems Design are:
[Ring (-1) - Hypervisor] Ring 0 - the Kernel Ring 1 - other OS components Ring 2 - device drivers Ring 3 - user applications
Newer computer hardware segments the bus into a ___, which contains the core components and slower ___ containing the peripherals and hard disk
Northbridge (or Host Bridge); Southbridge
modern CPU’s are divided into a ___ and ___ which fetches instructions from memory and delivers them
ALU (Arithmetic Logic Unit); CU (Control Unit)
the 4 basic functions of a CPU are:
- Fetch (get instruction from memory)
- Store (store the result into another register)
- Execute (adds or subtracts values in a register)
- Decode
an ___ can be sent to the CPU by either hardware or software when another process needs to take priority
interrupt
a ___ carried out by a CPU is called a Task
Heavy Weight Process (HWP)
as a CPU carries out processes, a parent process can spawn child processes called ___, which in contrast to Tasks are considered ___ and often share memory in an operation called ___
threads; Light Weight Processes (LWP); multithreading
a computer process can exist in 5 states:
- New
- Ready (waiting to be executed)
- Running
- Blocked (waiting for I/O
- Terminate (completed)
___ is a system using more than one CPU at a time
multiprocessing
___ is when tasks share a common resource (like a CPU)
multitasking
___ is when more than one program is running at the same time
multiprogramming
___ in a CPU prevents one process from affecting the confidentiality, integrity or availability of another, particularly in multi-use and multi-taking environments
memory protection
___ in a CPU is a logical control that tries to prevent one process from interfering with another
process isolation
___maps processes in a CPU to specific memory locations in order to protect the integrity, confidentiality and availability of each process
hardware segmentation
___ provides virtual address mapping between applications and hardware memory
virtual memory
___ moves entire processes from primary memory (RAM) to/from secondary memory (Disk)
swapping
___ copies a block from primary memory (RAM) to/from secondary memory (Disk)
paging
the ___ is the low level OS (boot sector), which runs a basic ___ on startup to verify the integrity of the system prior to loading and executing the ___ and then the rest of the OS
BIOS (Basic Input Output System); POST (Power On Self Test); kernel
a ___ can be used to ensure the integrity of the boot sector, storing cryptographic keys, hashes and algorithms, but also used in random number generation
TPM (Trusted Platform Module)
___ prevents viruses from using memory locations reserved for Windows and other authorized programs
DEP (Data Execution Prevention)
___ guards against buffer overflow attacks by randomizing the memory locations where system executables are loaded
ASLR (Address Space Layout Randomization)
a kernel can be either ___ (one static executable) or ___ (modular - which may run in user mode/ring 3)
monolithic; microkernels
one advantage of microkernels is ___
they can load and execute modules to run non pre-compiled hardware
the ___ is a core function of the kernel which handles all access between subjects and objects and cannot be bypassed
reference monitor
Windows NTFS (New Technology File System) has 4 basic file permissions: and one called \_\_\_ which includes the ability to change permissions
Read, Write, Read & Execute, Modify;
Full Control
in UNIX/Linux, the 3 file permissions are ___ and can be set at the 3 levels for the ___
read(r), write(w) and execute(x);
owner, group and world
when multiple OS kernels run on the same hardware, this is called ___, and when multiple machines/locations are used for a single process, this is called ___
virtualization; distributed computing
clients on a virtualized network should always be on the same ___ but ___ separated if they belong to different groups
network segment (internal, DMZ, etc.); logically (different VLANS)
on a virtualized network, clients with different trust levels should be on separate hosts, to minimize the damage caused by ___ leading to privilege escalation
VM Escape