Gary 02 - Security modules Flashcards
What are the 3 basic terms that are need to be fulfilled while designing a secure system.

What is confidentaility in secure system.
(POUFNOŚĆ)
The confidentiality is focused on the information and making sure the **only thing as you can see who have a right to say the information conceded. **
Wha is an integrity in secure system.
(SPÓJNOŚĆ)
Integrity, the data has not been distributed.
What the accessability is about in secure system.
(DOSTĘPNOŚĆ)
Without access security is pointless. The secured assets has to be accesable to be used by the people who need to use them and protectes them.
What authenticity is about? Why it is so important?
(AUTENTYCZNOŚĆ)
Authenticity anwsets the question is it really from who they say it is from, is it genuine, uses digital signatures.
What is non-repudiation. Where is it used and why is it important.
(NIEZAPRZECZALNOŚĆ)
Non-repudiation is law focused, it is the obligations of a contract. So you cannot say you did not receive or did not send the transaction. Technology helps but it is Law based.
What are the other 3 things that describe security system, the incentives of creating one, the environment.

What is a threat.
the threat what it is that might happen. The thing we are securing our assets from.
What is a vulnerability.
The vulnerability where we are week. The weaknesses of our system, the potential attack points we need to focus on to secure them.
What is a controll.
The control is how do we handle the weakness to make sure that the threat doesn’t become a reality.
What is a good metaphore of secure system and why.
Chain.
Describe the Static Security Model.

How the more advance model f security look like.

What is a procedure and who has to stick/obey/follow to it?
The procedure is a set of rules how the access has to be granted and how the security has to be kepet, for example authenticity check by providing the valid password and username.
What is an ethic code?
So you will have to follow a code of ethic that appliers to security. This applies to ethical hackers.
However the Foe does not follow these codes. Kill the guard.
What is another layer of static security model that concerns the treasure.
The encryption.

What is an Infromation Passing security model. What are the elements of that model and how are they designed.

What are the sourcess of attack in case of Information-Passing security model.
Note that attack may come in terms of:
- Corruption of original information
- Disruption of communication
- Corruption of information in transit
- Interference with processing of information
- Nullification of action
What are the additional layers in Information-Passing security model.

What is communication about in information-passing security model.
Communications, moving from one area of storage to another area of storage.
How can we maintain na access or communication in information-passing model.
Locking it up in some secure server, sets up secure linkage through the stage coach.
What is Information Sharing security model about? Why is it so different from previous models?
This relates to “security in the marketplace”.
In a distributed environment, we need to be able to “police” entry and exit from the marketplace, but also monitor activity within the marketplace.
What are the benefits of Security Models? For what are they designed for?
In general, security models -in text books - come from the realms of “formal methods”
–they are designed to help you prove that your system is secure.
–First thing you need to do is create the model, an abstraction of the real world
–General idea is to make a representation, and then test it to ensure it is secure or prove mathematically
What is the purpose of Security Models.
In general, security models -in text books - come from the realms of “formal methods”
–they are designed to help you prove that your system is secure.
–First thing you need to do is create the model, an abstraction of the real world
–General idea is to make a representation, and then test it to ensure it is secure or prove mathematically
the idea is that what we want to do is we want to make a representation of i t. system , and then tests it through whatever means but probably mathematically to prove conclusively that it is secure.
