Security Architecture and Engineering Flashcards
(222 cards)
What are the types of security model
Mandatory Access Control (MAC) Modes of Operation Confidentiality: Bell-LaPadula Integrity: Biba Lattice Commercial: Clark-Wilson
What is Mandatory Access Control (MAC)
Read down, write up
can only access object if the subject clearance is equal to or greater than the object’s label (Top Secret, Secret, etc..)
What are the four types of Modes of Operation
Dedicated
System High
Compartmented
Multilevel
What is Dedicated mode of operation
only contains object of one classification label (e.g. Top Secret)
Need to have clearance of equal to or higher to access the object
What is System High mode of operation
contains mixture of labels (confidential, secret, top secret)
Need to have clearance of the highest object
What is Compartmented mode of operation
all subjects have necessary clearance but don’t have formal access approval or Need to Know
Uses technical control to enforce need to know vs policy basis need to know
Formal access approval for SOME information they will access on the system.
A valid need to know for SOME information on the system.
All users can access SOME data, based on their need to know and formal access approval.
What is Multilevel mode of operation
stores objects at different labels
allow access by subject with different clearances
What is Bell-Lapadula security model
Confidentiality
No Reads up
No Write Downs
What is Bell-Lapadula - Strong
Stuck at level
Can only perform operations at that level
What are the 2 types of Bell-Lapadula tranquillity
Weak Tranquility property - the label of the subject and the object can’t change to violate defined security policy
Strong Tranquility property - label never change during operations
What is Biba security model
Integrity (think of time, isn’t confidential, but requires integrity)
No read downs, no write up
Which security model deal with integrity
All the model contains the letter I
Biba
Clark-Wilson
Non-Interference
What is Lattice security model
Confidentiality
Deals with data flow
No read up, no write down
What is the Clark-Wilson model
internal/external consistency
Authorized users cannot make unauthorized changes
Separation of duties
What is the State Machine model
Captures current security posture
Test all paths
What is the Research model
used to research the best security posture
Information Flow Model, Bell-Lapadula is one of them
Non-interference - High level action does not determine low level user visibility (NSA and pizza story)
What is the Chinese Wall model
No information flow is allowed that could cause information leakage that could lead to conflict of interest
Treat them as separate companies
aka Brewer Nash
What is Trusted Computing Base (TCB)
all components are properly implemented and secure
What is a Reference Monitor
Mediates all access between object and subjects
Checks to ensure they are authorized to view/access objects
What is Domain Separation
group of object with same security requirement
e.g. Top Secret object, HR department
What is COI
Conflict of Interest
What are the 3 types of Domain Separation
Execution Rings
Base Address Registers
Segment Descriptors
What are the 4 Orange Book classes
A. Verified Protection (MAC +
B. Mandatory Protection (Mandatory Access Control)
C. Discretionary Protection (Discretionary Access Control)
D. Minimal Protection (e.g your laptop)
What are the key principles of The Orange Cook
Functionality - how well does it operate
Effectiveness - how secure is it
Assurance - can we prove it is secure
Lifecycle assurance -