Security Architecture and Engineering Flashcards

1
Q

Which aspect of the CIA triad is the Bell-LaPadula model concerned with

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three properties of the Bell-LaPadula model

A

Simple security property - no read up
* Security property - no write down
Strong * property - no read or write up and down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of access control does the Bell-LaPadua model apply to

A

Mandatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which aspect of the CIA triad is the BIBA model concerned with

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of access control does the BIBA model apply to

A

Mandatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the axioms and properties of the BIBA model

A

The Simple Integrity Axiom states that a subject at a given level of integrity must not read data at a lower integrity level (no read down).
The * (star) Integrity Axiom states that a subject at a given level of integrity must not write to data at a higher level of integrity (no write up).[3]
Invocation Property states that a process from below cannot request higher access; only with subjects at an equal or lower level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of access control is Lattice based access control

A

Mandatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is LBAC

A

Lattice based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What access does a subject with Top Secret {crypto, chemical} have?
What access does a subject with Top Secret {chemical} have

A

Everything
Only {Chemical} in secret and top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Graham-Denning model uses what three concepts

A

Objects, Subjects and Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the Graham-Denning Model what are the 8 rules

A

Transfer, Grant and Delete ACCESS (3)
Read create and destroy OBJECT (3)
Create and Destroy SUBJECT (2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the HRU

A

Harrison Ruzzo Ullman model - an operating system level computer security model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is the HRU different from the Graham-Denning Model

A

Considers Subjects to be Objects too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the six primitive operations of the HRU

A

Create (object or subject)
Destroy (object or subject)
Add right to access matrix
Remove right from access matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What aspect of the CIA triad does the Clark-Wison model focus on

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This security model separates users from the back-end data through “Well-formed transactions and “Separation of Duties”

A

Clark-Wilson Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What concepts does the Clark-Wilson model use

A

Subject/Program/Object

18
Q

In the Clark Wilson model what are well formed transactions

A

A series of operations that transition a system from one consistent state to another consistent state

19
Q

Which model prohibits information flow between subjects and objects that would create a conflict of interest

A

Brewer-Nash

20
Q

Which model ensures that any actions that take place at a higher security level do not affect or interfere with actions that take place at a lower level

A

Non-Interference model

21
Q

What are security modes

A

Mandatory access control (MAC)
Discretionary Access Control (DAC)

22
Q

Using fixed-length sequences of input plaintext symbols as the unit of encryption

A

Block Mode Encryption

23
Q

Size in symbols (usually bits or bytes) for a particular block mode encryption algorithm or process

A

Block size

24
Q

The study of techniques for attempting to defeat cryptographic techniques and, more generally, information security services

A

Cryptanalysis

25
The science that deals with hidden, disguised, or encrypted communications, files, or other information. It consists of both cryptography and cryptanalysis
Cryptology
26
The complete set of hardware, software, communications elements, and procedures that allows parties to communicate, store information, or use information that is protected by cryptographic means. The system includes the algorithm, key, and key management functions, together with other services that can be provided through cryptography.
Cryptosystem
27
One or more parameters that are inherent to a particular cryptographic algorithm and its implementation in a cryptosystem.
Cryptovariable(s)
28
The process and act of converting the message from its plaintext to ciphertext. Sometimes it is also referred to as enciphering.
Encryption
29
A form of cryptanalysis that uses the frequency of occurrence of letters, words, or symbols in the plaintext alphabet as a way of reducing the search space.
Frequency Analysis
30
A system that uses both symmetric and asymmetric encryption processes.
Hybrid Encryption System
31
Refers to transmitting or sharing control information, such as encryption keys and cryptovariables, over the same communications path, channel or system controlled or protected by that information.
In-Band
32
A process of reconstructing an encryption key from the ciphertext alone, such as when the original key has been corrupted, lost, or forgotten. Requires a known way of reverse-engineering the algorithm (i.e., a successful means of conduction a ciphertext-based attack).
Key recovery - but if you can do it, then it was not safe
33
Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.
Key space
34
A security model that ensures that objects and subjects at one level of sensitivity don't inappropriately interact with the objects and subjects at other levels. Each data access attempt is independent of all others and approved, if appropriate, by the security architecture.
Non-interference Model
35
System elements that are used to provide a value chosen over a key space, such that on successive uses of the function the values returned will have as close to a near-perfect random distribution over that key space as possible.
Random and Pseudorandom Number Generators
36
A symmetric encryption key generated for one-time use, such as during a specific internet connection session.
Session key
37
A system using a process that treats the input plaintext as a continuous flow of symbols and encrypts one symbol at a time.
Stream mode encryption system
38
The process of exchanging one letter orbit in an input plaintext (and its alphabet) for another symbol in the output alphabet.
Substitution
39
An encryption or decryption process using substitution.
Substitution Cipher
40
The process of reordering the plaintext to hide its meaning
Transposition or permutation
41
An encryption or decryption process using transposition.
Transposition cipher
42
The amount of effort necessary to break a cryptographic system, usually measured in total elapsed time
Work factor