Domain 3. Sec Architecture and Engineering - Security Models Flashcards

1
Q

Which Bell-LaPadula rule is also known as the “no write down” rule?

A

Star (*) Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bell-LaPadula Rules

A

Confidentiality Model:

Most likely in Government and Military programs. Strict need-to-know environments

Simple security property: (no read up).

Star () property: (no write down).

Strong start () property: No read or write to security level you don’t have access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lattice-based Model

A

A security model that uses a hierarchical lattice structure to define and enforce access rights. The lattice structure sets varying security levels for different resources and users.

The Bell-LaPadula model is an example of a lattice-based model. In Lattice-based models, subjects can only access objects as long as they are in range of their lattice position. The object’s classification and labels determine lattice positions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Clark-Wilson Model

A

Integrity Model

Relies mostly on separation of duties.

Uses transformation procedures (TPs) and constrained data items (CDIs)

Similar to Biba Model..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Biba Model

A

Integrity Model

Prevents info flow from low sec level to higher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Brewer and Nash Model

A

Confidentiality model (I think)
- Use a dynamic access control based on objects previous
actions.
- Subject can write to an object if, and only if, the subject
cannot read another object in a different dataset.
- Prevents conflict of interests among objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information Flow Model

A

An information-flow model prevents the movement of information from one classification to another.

Bell LaPadula and Biba are both information-flow models.

The model controls the flow of information from high security to low security classifications. These models are used to avoid unauthorized access to data or to compromise the integrity of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lipner Model

A

Commercial Mode BLP + Biba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Graham-Denning Model

A

Focuses on the secure creation and deltion of subjects and objects.

Uses an access matrix.

Rule 1: Transfer Access,
Rule 2: Grant Access,
Rule 3: Delete Access,
Rule 4: Read Object,
Rule 5: Create Object,
Rule 6: Destroy Object,
Rule 7: Create Subject,
Rule 8: Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Harrison-Ruzzo-Ullman
Model

A

Extensionof the Graham-Denning model.

Restricts operations able to perform on an object to a defined
set to preserve integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

M of N Control

A

Split knowledge control policy used to manage Key Escrow using the Minimum (M) of the total Number (N) of employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

State Machine Model

A

State machine security models require that all actions that change the state must be authorized, and the machine’s state must remain secure during transitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

State Transition

A

Change of a system between one state and another. i.e. A VM is booted from a snapshot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC

A

Mandatory Access Control:

Uses classifications and labels to define user access.

Often referred to as lattice-based model because it looks like a garden wall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptology

A

Cryptology is the science of secure communications. It is the study of both cryptography and cryptanalysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptography

A

Cryptographers study encryption

17
Q

Cryptanalysis

A

Cryptanalysts study methods to break encryption.

18
Q

Noninterference model

A

Class of Security Models:

Concerned with how the actions of a subject at a higher sec level affect the system state or actions of a subject at a lower level.

Loosely based on the information flow model,

Addresses how the actions of a higher security level subject impacts the system state or actions of a subject at a lower security level.

(Information flow model is in turn based on the state machine model. Information flow models are constructed to block unauthorized, insecure, or restricted information flow)

19
Q

State-Machine Model

A

Uses state variables to represent the system’s state of security through state transitions.

20
Q

Common Criteria

A

Security Framework- International version of TCSEC (US) and ITSEC (EU) to a global/international version of these evaluations.

Target of Evaluation

Has 7 EAL Levels, 1 is lowest, 7 is highest.

SAR (security assurance requirements)

21
Q

TCSEC

A

This is the orange book. The Formal implementation of the bell-lapadula model.

22
Q

Orange Book

A

THIS IS ITSEC! This book was part of the Rainbow Series of books that defined various computer security standards and guidelines. The Rainbow Series of books was published by the US Department of defence itself. Formal implementation of the bell-lapadula model.

23
Q

Take-Grant protection model

A

Employs a directed graph to show how rights can be passed from one subject to another or from a subject to an object.

A subject with a grant right - can then GRANT that right to any other subject or object.

A subject with a TAKE right, can take a right from another subject.

Additionally there are CREATE and REMOVE rule to generate or delete rights.

24
Q

BLP vs Biba

A

BLP = No Read Up, No Write Down

Biba = No Read Down, no Write up

25
Q

Bell-Lapadula and Biba:

Reading is simpler than writing = simple rule = read.

It’s written in the stars = * rule = write.

A
26
Q

Access Control Triple

A

When Subjects access and modify objects indirectly through an interface or program. This is known as the “access triple” and is made up of the subject/program/object.

Concept in Clark-Wilson model

27
Q

Security Protection Rings - which are not usually implemented

A

1 and 2 usually contain drivers. Drivers are usually integrated into ring 0, so rings 1 and 2 functionally are not used all that often.