Security Principles Flashcards
(31 cards)
What are the terms for the security triad?
CIA:
Confidentiality
Integrity
Avaliability
What does C in CIA stand for, and what does it mean?
Confidentiality
It ensures that only the intended persons or recipients can access the data
What does I in CIA stand for, and what does it mean?
Integrity
It aims to ensure that the data cannot be altered; moreover, we can detect any alteration if it occurs
What does A in CIA stand for, and what does it mean?
Avaliability
It aims to ensure that the system or service is available when needed
What are two other terms that can be used beyond CIA?
Authenticity
Nonrepudiation
What does Authenticity mean?
Authentic means not fraudulent or counterfeit. Authenticity is about ensuring that the document/file/data is from the claimed source
What does Nonrepudiation mean?
Repudiate means refusing to recognize the validity of something. Nonrepudiation ensures that the original source cannot deny that they are the source of a particular document/file/data. This characteristic is indispensable for various domains, such as shopping, patient diagnosis, and banking
What are the terms of the triad for attacking a system?
DAD
Disclosure
Alteration
Destruction/Denial
What does the first D in DAD stand for, and mean?
Disclosure
It is the opposite of confidentiality. In other words, disclosure of confidential data would be an attack on confidentiality
What does the A in DAD stand for, and mean?
Alteration
It is the opposite of Integrity. For example, the integrity of a cheque is indispensable
What does the second D in DAD stand for, and mean?
Destruction/Denial
It is the opposite of Availability
What does the Bell-LaPadula Model aim to achieve, and what are its three rules?
Confidentiality
Simple Security Property
Star Security Property
Discretionary-Security Property
What is the Simple Security Property of the Bell-LaPadula Model?
This property is referred to as “no read up”; it states that a subject at a lower security level cannot read an object at a higher security level. This rule prevents access to sensitive information above the authorized level
What is the Star Security Property of the Bell-LaPadula Model?
This property is referred to as “no write down”; it states that a subject at a higher security level cannot write to an object at a lower security level. This rule prevents the disclosure of sensitive information to a subject of lower security level
What is the Discretionary-Security Property of the Bell-LaPadula Model?
This property uses an access matrix to allow read and write operations. An example access matrix is shown in the table below and used in conjunction with the first two properties
What does the Biba Model aim to achieve, and what are the two rules?
Integrity
Simple Integrity Property
Star Integrity Property
What is the Simple Security Property of the Biba Model?
This property is referred to as “no read down”; a higher integrity subject should not read from a lower integrity object
What is the Star Security Property of the Biba Model?
This property is referred to as “no write up”; a lower integrity subject should not write to a higher integrity object
What does the Clark-Wilson Model aim to achieve and what are the following concepts?
Integrity
Constrained Data Item (CDI)
Unconstrained Data Item (UDI)
Transformation Procedures (TPs)
Integrity Verification Procedures (IVPs)
What is the Constrained Data Item (CDI) of the Clark-Wilson Model?
This refers to the data type whose integrity we want to preserve
What is the Unconstrained Data Item (UDI) of the Clark-Wilson Model?
This refers to all data types beyond CDI, such as user and system input
What is the Transformation Procedures (TPs) of the Clark-Wilson Model?
These procedures are programmed operations, such as read and write, and should maintain the integrity of CDIs
What is the Integrity Verification Procedures (IVPs) of the Clark-Wilson Model?
These procedures check and ensure the validity of CDIs
What does Defence-in-Depth refer to?
It refers to creating a security system of multiple levels
It is also called Multi-Level Security