8836 Assurance in trusted OS Flashcards

1
Q

What are ways to actually demonstrate the security of an operating system?

A

Testing, Formal verification, and informal validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was M-o-o-t designed to combat?

A

Moot keeps the government at bay by carrying separation to the extreme. I was designed in response to U.K. Regulation of Investigatory Powers Act(RIPA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the largest single source of Operating system vulnerabilities?

A

I/O processing is the largest single source of Operating systems vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does an ambiguity in access policy lead to weekness?

A

On one hand we want to seperate users and protect their individual resources. On the other hand users depend on shared libraries and utilities. The distinction between isolation and seperation is not always clear .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the levels of evaluation in the Orange book and what do they mean?

A

D. Minimal protection
C1. Discrentionary Security Protection
C2. Controlled Access Protection
B1. Labeled Secruity Protection
B2. Structured Protection
B3. Security Domains
A1. Verified design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to Lawton what are the additional benefits of open source?

A

Cost: Source code is available to the public.
Quailty: the code can be analyzed.
Support: as the public finds they can propose and fix.
Extensibility: public can extend code for additional functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Validation when it comes to security assurance?

A

Requirements checking: Cross check each requirement against the source code or runtime.
Design and code reviews: Rigourous, review of design and code components.
System testing: Build tests to check the system, Data expected from reading reqs can be checked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Formal verification

A

Testing the results to verify the correctness of the functionality and the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Penetration testing

A

Security experts try to crack the system being tested using tool kits to exploit weak spots. Does not garuntee the system is fault free. Should be done in real world conditions on a running system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the primary differences between the German green book and the TSEC “Orange” book?

A

The Germans added Error recovery, continuity of service, and data communication security. The Germans had a grid of verification Functionality1-10 and Q0-7 producing 80 possible security evaluations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ITSEC?

A

Preserved the German functionality classes but allowed for the more stringent claims language of the British.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does ITSEC compare to the US TCSEC?

A

ITSEC has, new functionality requirements surpasses TCSEC, Allows low assurance or High assurance products, Allows evaulations of any kind of product. Subject to market forces.
Disadvantages: complicates choice, requires users to decide level needed, some functionality requires high assurance but doesn’t garuntee it, gov doesn’t have direct control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happend to the combined federal criteria?

A

The US joined forces with Europe and Canada and published the Common Criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the Orange book how are threats characterized?

A

Penetration, malicious code, and subversion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

According to the Orange book what is penetration?

A

Using user permissions to obtain additional access to resources or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

According to the Orange book what is malicious code?

A

Software, that contains hidden or extra functions that exploit legitimate authorization.

17
Q

According to the Orange book what is subversion?

A

malicios modification of the source or binaries before distribution.

18
Q

What are the two categories of fundamental security requirements in the Orange Book.

A

Features - Four deal with what needs to be provided to control access to information
Assurance - Two deal with how one can obtain credible assurances regarding the features in a Trusted computer system.

19
Q

What is a trusted Path?

A

It provides assurances you are indeed talking to a trusted component.

20
Q

In the German Green book what are F and q?

A

functionality and quality assurance.

21
Q

What did the US combined Federal Criteria in 1993 give us.

A

Security target and protection profile.