Lecture 10: 11th October 2019 Flashcards Preview

CS4203 Computer Security > Lecture 10: 11th October 2019 > Flashcards

Flashcards in Lecture 10: 11th October 2019 Deck (49)
Loading flashcards...
1

What are Security Policies?

A set of rules and practices governing how a system
will manage and protect files with especial regard to sensitive data or code. Some companies will write a Security Policy document that defines the security (and safety) of the system. This can be considered as a legal
document if the company has an intrusion.

2

What are Reference Monitors?

The Reference Monitor is the mechanism or abstract concept as to how the access control policies are applied to a computer system.

3

What are Security Models?

A Security Model is the high-level description of the rules which security policies should implement. It is usually an overarching guide including the flow of information between subjects and resources, explicitly describing what entities are covered by the model. Some models may even include data structures or cryptographic specifications.

A model should outline possible threats, data access rules and who is a valid user. Some models enforce confidentiality, others integrity and others access.

4

What is the Military Model?

The most basic security model, in which there is a hierarchy or linear ordering of degrees of sensitivities

5

What are subjects?

People or processes who wish to access resources (objects)

6

What are relationships?

The rules defining what specific access subjects of given levels have to objects of levels (both grouped into classifications). Subjects can write to any level but only read at their level or lower.

7

What are partially ordered sets?

A set of elements in which at least some of the elements can be compared to each other with a binary relation.

8

What are partially ordered sets aka?

posets

9

What are reflexive comparisons?

Elements comparing themselves to themselves

10

What are transitive comparisons?

Where you chain relations; e.g. if a < b and b < c then a < c

11

What are anti-symmetric comparisons?

No 2 unique elements may precede each other: be related in both directions

if R(a, b) is true and a ≠ b, then R(b, a) must not hold
if R(a, b) is true and R(b, a) is also true, then a = b

if a ≤ b and b ≤ a then a = b

12

How can lattices be formed from posets?

Build up nodes of classification levels; e.g. top secret, secret, etc applied to science (weapons development) and military (weapons deployment). Arrange in a tree-like graph from most to least access. Most will be top secret for science and military, then top-secret one and secret other, etc. Comparisons arise from comparing science and/or military clearance levels of users.

13

How does the PM, their top military general, and top scientific advisor illustrate partial order-based systems?

PM has top secret science and military clearance. General has top secret military but lower science clearance, and scientist has top secret science clearance but no military clearance.

14

What is domination?

Domination is a subject having higher access levels and indicating the direction of information flow. Those with higher access levels, closer to the root, dominate others.

15

Given two objects at different levels, what is the minimum security level a subject must be at to read both objects?

The higher of the security levels of the 2 objects

16

Given two subjects at different levels, what is the maximum security level an object can be at and be read by both?

The lower of the security levels of the 2 subjects

17

What is the Hierarchical Model?

Another name for the military model. The military model is the most basic security model, in which there is a hierarchy or linear ordering of degrees of sensitivities

18

What is the System Low?

the level dominated by all others, i.e. the lowest access level that is a leaf node

19

What is the System High?

the level that dominates all others, i.e. the highest access level that is the root node

20

When does one user's privileges dominate another's?

When they can perform access operations on every object the other user can

21

What does it mean when two users have the same privileges?

They are at the same access level

22

What is the hierarchical model aka?

the military model

23

How can classifications work in conjunction with codewords?

To implement intra-access level compartmentalisation, combine access levels with codewords; this might be by military operational codenames, for instance. Compartments can, however, cross over different security levels.

24

What is ss-property?

The simple security policy states that no process can read data at a higher access level. This is known as no read up: NRU.

25

What is NRU?

no read up: no subject can read data at a higher access level.

26

What is *-property?

no subject can write data to a lower level, i.e. no write
down (NWD).

27

What is NWD?

no write down: no process can write data to a lower level.

28

When may a subject read an object?

If the security class of the subject is greater than or equal to that of the object

29

When may a subject s with read access to an object, o, write to another object, p?

If the security class of the object p is greater than or equal to that of o (apparently but I think it makes sense to just compare s to both directly).

30

What is the BLP Secure flow of information?

The way in which information propagation is restricted with rules to prevent leakage. Only objects can read from subjects at higher levels. Subjects can only write to higher levels - not read as well. Both can read and write to others on the same level.