Security Engineering (ch 6-10) Flashcards

1
Q

What role does a reference monitor play in a TCB (Trusted Computing Base) security model

A

The reference monitor validated access to to every resource prior to granting access requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Most of the higher-order security models, such as Bell-LaPadula and Biba, are based on which model?

A

state machine model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Clark-Wilson access control model was designed to protect what aspect of security?

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Clark-Wilson access model is also called a(n) ___________________ interface model

A

The Clark-Wilson model can also be described as a restricted interface model because it uses classification-based restrictions to offer subject-specific functions and information. Subjects at one classification level will see a specific set of data and obtain access to a related set of functions, while another subject at a different classification level will see a different dataset and obtain access to a different set of functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Bell-LaPadula access control model was designed to protect what aspect of security?

A

The Bell-LaPadula model is focused on maintaining the confidentiality of objects. Bell-LaPadula does not address the aspects of object integrity or availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of processing makes use of a multithreading technique at the operating system level?

A

Symmetric multiprocessing systems implement multithreading techniques at the operating system level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly