Wiley_08092017 Flashcards
________ designed by Visa and Mastercard used by E-Commerce Security
S E T, SET, Secure Electronic Transaction
securely CREATE and DELETE of subjects and objects..
Graham Denning – Create and Delete…
GRAHAM-DENNING: Graham Denning
dfd
dfd
The ________model addresses DATA INTEGRITY and is based on the idea of defining a set of system states, initial states, and state transitions. Through the use of and limitations to only these predetermined secure states, integrity is maintained and interference is prohibited…
SUTHERLAND… STATE MACHINE MODEL…. INTEGRITY
SUTHERLAND
The _____model addresses DATA INTEGRITY. This is a MULTILEVEL model is a state machine concept that is based on FLOW.
Uses * STAR and SIMPLE states. STAR – No WRITE UP.. SIMPLE – No READ DOWN….
BIBA..MULTILEVEL..INTEGRITY…
BIBA
This model is..Dynamic based on previous activity. ..
This requires the following to operate properly:
1) properly identified subjects,
2) one or more datasets,
3) conflict class definitions for all datasets
(A K A Chinese Wall) is based on dynamic changes of user privileges and access based on users previous activity..
Brewer Nash
BELL-LAPADULA: The Bell-Lapudal model addresses CONFIDENTIALITY only. A subject cannot read an object at a higher level. …. A trusted subject can violate the star property of “no write down” in the act of declassification, which is not an actual violation of security..
Bell-Lapadula ..subject cannot read at a higher level…
Bell Lapadula
GRAHAM-DENNING: Graham Denning securely CREATE and DELETE of subjects and objects..
Graham Denning – Create and Delete…
Denning is Create and Delete
A ONE TIME pad is a type of ________ CIPHER. A ONE TIME KEY IS EXTREMELY LONG.
.
PROS OF SYMMETRIC…QUICK … SPEED 1,000 to 10000 times faster…..
CONS OF ASYMMETRIC…SLOW…
STREAMING
A ONE TIME pad does not have a ________pattern.
repeated
CONS of SYMMETRIC CRYPTO.
KEY EXCHANGE “Out of Band”….
DOES NOT SUPPORT NONREPUDIATION….
NOT SCALABLE…..
KEYS NEED TO BE GENERATED OFTEN…
PROS of SYMMETRIC CRYPTOGROPHY
FAST, 1000 to 10000 faster than ASYMMETRIC
CONS OF ASYMMETRIC
SLOW
PROS of ASYMMETRIC…
Provides CONFIDENTIALITY, INTEGRITY, AUTHORIZATION, NON REPUDIATION
KEY EXCHANGE IS SIMPLE…..SCALABLE..C I A N…
3 COMPOSITION THEORIES: Input and output flow between systems.
Cascading, feedback, and hookup are the three composition theories. Cascading, feedback, and hookup are the three composition theories…..
Cascading, feedback, and hookup are the three composition theories..
3 Composition Theories Explained:
Cascading..Input from output from another system..
Feedback…One system provides input to another system which reciprocates..System A to B..then B back to A…
Hookup…One system to another, but also sends to an EXTERNAL system…
PROTECTION RING: Created 1963 – 1969 by Bell, M I T, G E. For Multics O S. This is an O S protection model.
Ring model is PRIORITY, PRIV, MEMORY SEGMENTATION..
Ring 0 ..has direct access to the most resources..ring 0 has FULL Rights…O S Kernel/Memory.
Ring 1.. other O S components..
Ring 2..Drivers and Protocols…
Ring 3 is user mode…Programs and Applications..
Inside ring has highest privilege.
0 to 2 is Supervisor / Privileged Mode.. Note: 1 and 2 are used for drivers.
3 is user mode..
_________ mode is the basic mode used by the CPU when executing user applications. In this mode, the CPU allows the execution of only a portion of its full instruction set. This is designed to protect users from accidentally damaging the system through the execution of poorly designed code or the unintentional misuse of that code
User mode
____________ firewalls enable the real-time modification of the filtering rules based on traffic content
Dynamic packet-filtering
Dynamic packet-filtering firewalls enable the real-time modification of the filtering rules based on traffic content……. Dynamic packet-filtering firewalls enable the real-time modification of the filtering rules based on traffic content……
________ ensures the data is NOT altered without authorization. Integrity controls protect against alteration.
INTEGRITY can be enforced by using
INTEGRITY.
Message INTEGRITY is enforced using ENCRYPTED MESSAGE DIGEST such as _____ _______ and ____ _______.
DIGITAL SIGNATURES
PUBLIC and SECRET KEY CRYPTOSYSTEMS.
NIST SP 800-18 goes over _______.
responsibilities
_________ has ULTIMATE RESPONSIBILITY of the data. This is typically C E O, president, or department head or C I O. This role establishes rules and behavior. Provides information to the system owner on security requirements and security controls. Decides who has access to the data.
DATA OWNER
_______ _______ owns the system that processes the data. This is sometimes the same person as the DATA OWNER. Develops the security plan with information owners, systems administrators and functional end users. Develops acceptable use policy and ensures users get training. Updates security plan. .
SYSTEM OWNER