Cyber8836 Trusted OS Policy Flashcards

1
Q

What is the RVM

A

The reference validation Mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is meant by a trusted OS?

A

A trusted OS is an OS that is responsible for policy enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In respect to Trusted OS what is Policy?

A

A set of well defined, consistent, implementable rules that have been clearly expressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is mandatory access control (MAC)?

A

Access control mandated based on characteristics of the object and the user in the form of labels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Discretionary Access Control (DAC)?

A

Access control based on the owners discretion, normal ACLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to you address the scale of access matrixes?

A

Role based Access Control addresses the scale of access matrixes, by creating roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the access control primitives?

A

RBAC - Roles assigned to people
ABAC - Attributes assigned to users, objects, environment, compared.
CBAC - People in a photo, Context based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is sensitivity?

A

The equivalent of classification.
Unclass
confedential
secret
TS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are compartments?

A

Special subset of records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a subjects label specify?

A

Their Clearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a company group belong to?

A

A company group belongs to a unique conflict class.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Chinese Wall access control policy?

A

A subject S can have access to objects from one and only one company group within a conflict class.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Clark Wilson Policy spec?

A

Users/roles (U)
Constrained Data Items (CDI)
Transformation procecedures (TP)
A user performs only authorized TP on CDI it has access to.

it is an application oriented policy model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly