Domain 3, Security architectures, designs, solution elements Flashcards
(100 cards)
Modes of Operation (security)
Way of an operating system to work at certiain levels of security.
Dedicated Mode
System contains objects of only one classification label. All subs must have clearance at least as high as the object
System High mode
contains mixed object levels. All subs must have clearance equal to the highest object classification.
Compartmented mode
Ass subs have necessary clearance, but also are required to get formal access approval. Need to know. Compartmented information better allows for need to know access.
Multilevel mode
Contains mixed object classes. The Reference Monitor controlls access between subjects and objects. Ensures subjects can only access info at their level.
Orange book
TCSEC, first security standard. Most concepts still in use today.
TCSEC
Trusted Comp System Evaluation Criteria
Orange Book - Divisions
D- lowest
C
B
A - highest
Classes
i.e. C1, C2, A1, A2. Higher is more secure
TNI/Red book
Trusted Network INterpretation. Uses orange book concepts to apply to networks.
ITSEC
Information tech security evaluation criteria
ITSEC
first successful internation eval model
ITSEC Assurance ratings
E0 - E6
ITSEC Functionality rating
F-C1, F-c2, F-b1, F-b2, F-b3
International Common Criterai
replaces ITSEC and TCSEC. Designed to evaluate commercial and govt systems.
Common Criteria ToE
Target of evaluation. System or product being evaluated
Common Criteria ST
Security Target. Documentation that describes the ToE, including sec requirements and operational env.
Protective Profile
unique set of sec. reqs for a specific category of products (i.e. firewall, end user pc, intrusion detect.)
Eval Assurance Levvel
EAL = score of the tested product or system
EAL Levels
EAL1 through EAL7
EAL1
Functionally tested
EAL2
Structurally tested
EAL3
Methodically tested and checked
EAL4
methodically designed, tested, and and checked