Week 2: Security policies. Safety and security usability. Flashcards
What are some examples of bad policies?
- If it does not address who determines “need-to-know” and how.
- If it mixes statements at different levels (organizational approval of a policy should logically not be part of the policy itself).
- If there is an implied rather than explicit mechanism: “staff shall obey” … what do they have to do? Must obedience be enforced by the system?
- If it doesn’t describe how breaches are to be detected, and who has a specific duty to report them?
What is a security policy?
A security policy model is a succinct statement of the protection properties that a system must have. It is the document in which the protection goals of the system are agreed with an entire community, or with the top management of a customer.
What is a security target?
A security target is a more detailed description of the protection mechanisms
The security target forms the basis for testing and evaluation of a product.
List some clarifications of multilevel security policy examples.
Top Secret
secret
confidential
unclassified
What 2 properties Bell-LaPadula (BLP) model enforce?
- The simple security property: no process may read data at a higher level. This is also known as no read up (NRU);
- The *-property: no process may write data to a lower level. This is also known as no write down (NWD).
What 3 letters of permission are there?
r - read
w - write
x - execute
who do the 3 types of permission apply to?
file owner
group owner of the file
all other users
Before the rwx, there is either a - or a d, what do these mean?
- means a regular file
d indicates directory
How can policies help safety security usability?
To ensure additional training is provided if needed so reduce risk
List the hierarchy of harms. list from most sophistated to volume of harm.
targeted attacks
generic malware
bulk password compromise
abuse of mechanism
What’s the difference between MAC and DAC in abbreviation?
DAC stands for Discretionary Access Control.
MAC stands for Mandatory Access Control.
What’s the difference between MAC and DAC in use?
DAC is identity-based access control. DAC mechanisms will be controlled by user identification such as username and password.
The operating system in MAC will provide access to the user based on their identities and data. For gaining access, the user has to submit their personal information.
What were the operational assumptions about the Bell-LaPadula (BLP) model?
it is also assumed that most staff are careless, and some are dishonest; extensive operational security measures have long been used,