Lecture 10 Flashcards
Security Models (32 cards)
What is the first thing to do when developing security models for an organization/fixing security issues?
evaluate the current levels of security exposure
What are Security Models used for?
formalize security policies by providing a set of rules.
When a system complies with a set of ________, it can be said to exhibit a level of trust.
security criteria
The _____, known as the orange book, is a combination of hardware software, and controls that work together to form a trusted base to enforce your security policy.
A. Trusted Control Baseline
B. Trusted Computing Base
C. Bell-LaPaluda
D. TCSEC
B. Trusted Computing Base
In the TCB, _______ validates access to every resource and may be a conceptual part of the TCB.
reference monitor
The _____ describes a system that is secure in every part of its possible states.
A. Secure State Model
B. Trusted Computing Base
C. Bell-LaPaluda
D. TCSEC
A. Secure State Model
The _____ describes a system that is secure in every part of its possible states. States depend on the previous state and the input.
A. Secure State Model
B. Trusted Computing Base
C. Bell-LaPaluda
D. TCSEC
A. Secure State Model
A ______ is based on the state machine model and focuses on the flow of information. It is designed to prevent unauthorized, insecure or restricted information flow.
information flow model
The _____ is concerned with the interaction of a higher subject being noticed or interacting with a lower subject.
Interference Model
A composition theory is based on what?
How inputs and outputs between multiple systems relate to one another.
What are the 3 types of composition theories?
A. Linked B. Cascading C. Hookup D. Waterfall E. Feedback
B. Cascading
C. Hookup
E. Feedback
The _____ employs a directed graph to dictate how rights can be passed from one subject to another or subject to an object.
A.Trusted Computing Base
B. Information Flow Model
C. Take-Grant Model
D. Biba Model
C. Take-Grant Model
A ______ is a table of subjects and objects that shows what privileges are given to the subject for that object.
Access Control Matrix
The _____ was developed by the DoD to address concerns about protecting classified information. A subject w/any level of clearance can access resources at or below its clearance level on a need-to-know basis.
A. Trusted Computing Base
B. Biba Model
C. Bell-LaPadula Model
D. TCSEC
C. Bell-LaPadula Model
The ____ property states that a subject may not read info at a higher sensitivity level. (no read up)
A. * (Star) Security
B. Simple Security
C. Discretionary
B. Simple Security
The ____ property states that a subject cannot write data from one level to an object at a lower level. (no write down).
A. * (Star) Security
B. Simple Security
C. Discretionary
A. * (Star) Security
The ____ property enforces the need to know principle where a subject only has access to objects it needs.
A. * (Star) Security
B. Simple Security
C. Discretionary
C. Discretionary
______ is focused on integrity and less on confidentiality.
A. Trusted Computing Base
B. Biba Model
C. Bell-LaPadula Model
D. TCSEC
B. Biba Model
The Biba Model’s ______ states that a subject cannot read an object at a lower integrity model (no read down).
A. Simple Integrity
B. *(Star) Integrity
A. Simple Integrity
The Biba Model’s _____ states that a subject cannot modify an object at a higher integrity level (no write up)
A. Simple Integrity
B. *(Star) Integrity
B. *(Star) Integrity
The ______ was created to permit access controls to change dynamically based on a user’s previous data. It creates security domains to prevent conflict of interest.
A. Biba Model
B. Bell-LaPadula Model
C. Brewer and Nash Model
D. TCB
C. Brewer and Nash Model
A closed system is what?
Designed to work with a small range of other systems.
An Open system is what?
Designed using agreed-upon industry standards and integrates easier with other systems.
____ allows a process to read from and write to only certain memory locations and resources.
A. memory confinement
B. memory restriction
C. process restriction
D. process confinement
D. process confinement