Chapter 8: Principles of Security Models, Design, and Capabilities Flashcards

1
Q

Subject vs Object

A

Subject makes request to access a resource (the object)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Transitive Trust

A

Concept that if A trusts B, and B trusts C, then A inherits trust of C through the transitive property
Serious security concern, may enable bypassing of restrictions or limitations
Employee using a web proxy to access a blocked site is an example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Closed System

A

Designed to work well with a NARROW range of other systems, generally all proprietary from same manufacturer. Potentially more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Open System

A

Designed using agreed upon industry standards to easily integrate with systems from other manufacturers using the same standards or that use compatible APIs (more attractive target)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

API

A

Application Programming Interface
Defined set of instructions allowed between computing elements such as applications, services, networking, firmware and hardware.
Defines the types of requests that can be made, how they can be made, what form the data takes, authentication and encryption requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fail Securely

A

Programmer codes in mechanisms to anticipate and defend against errors in order to avoid termination of execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fail Soft

A

Allowing a program to continue to operate after a component fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero Trust

A

Security concept where nothing inside organization is automatically trusted. Each request for activity or access is assumed to be from an unknown and untrusted source until otherwise verified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Privacy by Design (PbD)

A

Guideline to integrate privacy protections into products during early design phase rather than tacking it on at the end of development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confinement

A

Allows a process to read from and write to only certain memory locations and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trusted Computing Base (TCB)

A

Design principle that is the combination of hardware, software, and controls that work together to form a trusted base to enforce security policy. Should be as small as possible so a detailed analysis can reasonably ensure the system meets design specifications and requirements
Separated from rest of information system by security perimeter
For TCB to communicate with the rest of the system, must create secure channels with strict standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trusted Shell

A

Allows subject to perform command line operations without risk to the TCB or subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Reference Monitor

A

Access control enforcer for the TCB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Kernel

A

Collection of components in the TCB that work together to implement reference monitor functions. Mediates all resource access requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

State Machine Model

A

Describes a system that is always secure no matter what state is is in. All state transitions must be evaluated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information Flow Model

A

Focuses on controlling the flow of information- both direction of flow and type of flow. Only allows authorized information flows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Non-interference Model

A

Actions of a higher security level subject (A) should not interfere with the actions of a lower level user (B) or even be noticed by them. This is to prevent B from being able to deduce information about higher level classification

18
Q

Composition Theories

A

Explain how outputs from one system relate to inputs to another system

19
Q

Cascading Composition

A

Input for one system comes from output of another system

20
Q

Feedback Composition

A

One system provides input to another, which reciprocates by reversing those roles

21
Q

Hookup Composition

A

One system sends input to another system but also sends input to external entities

22
Q

Take-Grant Model

A

Employs a directed graph to dictate how rights can be passed from one subject to another or from a subject to an object, via take and grant rights

23
Q

Access Control Matrix

A

Table of subjects and objects that indicates the actions or functions that each subject can perform on each object
Administrative nightmare- managing each user individually

24
Q

Bell-LaPadula Model

A

Developed by DoD, states subject with any level of clearance can access resources at or below its clearance level. Within these levels access to compartmentalized objects is granted only on a need to know basis. Has three basic properties.

25
Q

Simple Security Property

A

Property of Bell-LaPadula Model. Subject may not read information at a higher sensitivity level (no read up)

26
Q
  • (Star) Security Property
A

Property of Bell-LaPadula Model. Subject may not write information to an object at a lower sensitivity level (no write down- prevent disclosure)

27
Q

Discretionary Security Property

A

Property of Bell-LaPadula Model. States that the system uses an access control matrix to enforce discretionary access control

28
Q

Biba Model

A

Designed after Bell-LaPadula but focuses on integrity. It is an inverse of Bell-LaPadula: no read down, no write up.

29
Q

Clark-Wilson Model

A

Uses an access control triplet, where subjects can only access objects via limited or controlled intermediary program, interface, or access portal

30
Q

Brewer and Nash Model

A

Separates security domains to prevent conflict of interest

31
Q

Goguen-Meseguer Model

A

Focuses on integrity- subjects allowed only to perform predetermined actions against predetermined objects

32
Q

Sutherland Model

A

Focuses on integrity. Uses predetermined secure states to prevent interference

33
Q

Graham-Denning Model

A

Focuses on the secure creation and deletion of both subjects and objects

34
Q

Harrison-Ruzzo-Ullman Model (HRU)

A

Focuses on the assignment of object access rights to subjects as well as the integrity/resilience of those rights

35
Q

Common Criteria (CC)

A

Defines various levels of testing and confirmation of system’s security capabilities. Number of the level indicates what kind of testing has been performed
International standard for evaluation of IT products
Based on two key elements, and provides Evaluation Assurance Levels (EALs)

36
Q

Protection Profiles (PP)

A

Key element of Common Criteria. Specify the security requirements and protections, which are considered the customer’s “security desires”

37
Q

Security Targets (STs)

A

Key element of Common Criteria. The vendor’s implemented security measures

38
Q

Evaluation Assurance Levels (EALs)

A

Evaluation Assurance Levels. Provided by Common Criteria. 7 levels, with EAL1 being lowest and EAL7 being highest.

39
Q

Authorization to Operate (ATO)

A

Official authorization to use a specific collection of secured IT/IS systems to perform business tasks and accept the identified risk
Typically issued for 5 years, but must be reobtained in event of a beach or a significant security change

40
Q

Memory Protection

A

Used to prevent an active process from interacting with an area of memory that was not specifically assigned or allocated to it

41
Q

HSM

A

Hardware Security Module
Cryptoprocessor that can manage and store digital encryption keys, accelerate crypto operations, support faster digital signatures, and improve authentication
Can be a chip on a motherboard, external peripheral, network attached device, etc
Include tamper protection to prevent misuse even if attacker gains physical access