Week 2: Security policies. Safety and security usability. Flashcards

1
Q

What are some examples of bad policies?

A
  1. If it does not address who determines “need-to-know” and how.
  2. If it mixes statements at different levels (organizational approval of a policy should logically not be part of the policy itself).
  3. If there is an implied rather than explicit mechanism: “staff shall obey” … what do they have to do? Must obedience be enforced by the system?
  4. If it doesn’t describe how breaches are to be detected, and who has a specific duty to report them?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a security policy?

A

A security policy model is a succinct statement of the protection properties that a system must have. It is the document in which the protection goals of the system are agreed with an entire community, or with the top management of a customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a security target?

A

A security target is a more detailed description of the protection mechanisms
The security target forms the basis for testing and evaluation of a product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List some clarifications of multilevel security policy examples.

A

Top Secret
secret
confidential
unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What 2 properties Bell-LaPadula (BLP) model enforce?

A
  1. The simple security property: no process may read data at a higher level. This is also known as no read up (NRU);
  2. The *-property: no process may write data to a lower level. This is also known as no write down (NWD).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What 3 letters of permission are there?

A

r - read
w - write
x - execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

who do the 3 types of permission apply to?

A

file owner
group owner of the file
all other users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Before the rwx, there is either a - or a d, what do these mean?

A
  • means a regular file
    d indicates directory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can policies help safety security usability?

A

To ensure additional training is provided if needed so reduce risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the hierarchy of harms. list from most sophistated to volume of harm.

A

targeted attacks
generic malware
bulk password compromise
abuse of mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the difference between MAC and DAC in abbreviation?

A

DAC stands for Discretionary Access Control.
MAC stands for Mandatory Access Control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the difference between MAC and DAC in use?

A

DAC is identity-based access control. DAC mechanisms will be controlled by user identification such as username and password.
The operating system in MAC will provide access to the user based on their identities and data. For gaining access, the user has to submit their personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What were the operational assumptions about the Bell-LaPadula (BLP) model?

A

it is also assumed that most staff are careless, and some are dishonest; extensive operational security measures have long been used,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly