13-1 Flashcards

1
Q

an information barrier preventing information flow between different groups within the same organization

A

chinese wall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

one of the oldest security models, based on the basic security theorem

A

Bell-LaPadula model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an older security model with similarities to bell-lapadula

A

biba integrity model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this is the oldest IT security certification and one of the most often asked for in job adds

A

CISSP ( Certified Information Systems Security Progfessional )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a subject object model first published in 1987 that attempts to achieve data security via well formed transactions and a separation of duties

A

Clark-Wilson Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CCTPEC

A

Canadian trust computer product evaluation criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the policies that control access based on named users and named objects

A

discretionary security property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

numeric levels 1 to 7 that define security assurance as a defined in the common criteria.

A

evaluation assurance levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this means that a subject can read an object only if the security level of the subject is higher than o equal to the security of the object.

A

simple security property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this means that a subject can read an object only if the security level of the subject is higher than or equal to the security of the object,

A

simple security property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a model that looks at a system transition from one state to another. it starts by capturing the current state of the system. later the system’s state at that point in time is compared to the previous state of the system to determine whether there has been a security violation in the interim.

A

state machine model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

in a computer security models, the subject is any entity that is attempting to access a system or data

A

subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

also TOE, an independent eval of a product to show that the product does

A

target evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the TCB is everything in a computing system that provides a secure environment

A

trusted computing base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

security guidelines created by the Commission of the European communities, analogous to the common criteria

A

information technology security evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attempts to influence political or military outcomes via information manipulation

A

information warefare