Udemy-Domain 3 Flashcards
ABAC stands for ___, and attributes could belong to ___ (3)
Attribute-Based Access Control;
subject (user - role, clearance..);
object (resource - owner, creation date…);
Environment (time, location, threat level)
RUBAC means ___, and is based on ___
Rule-Based Access Control; if, then statements
RBAC means ___
Role-Based Access Control
the ___ security model is Mandatory Access Control, and only concerned with the Confidentiality part of the CIA triad
Bell-LaPadula
the ___ security model is Mandatory Access Control and mainly focused on the Integrity part of the CIA triad
Biba
in the Bell-LaPadula security model,
the Simple Security Property is signified by ___,
the * Security Property by ___ and
the Strong * Property by ___
“No Read Up”;
“No Write Down”;
“No Read or Write Up and Down”
in the Biba security model,
the Simple Integrity Property is signified by ___,
the * Integrity Property by ___ and
the Invocation Property by ___
“No Read Down”;
“No Write Up”;
“No Read or Write Up”
LBAC means ___
Lattice Based Access Control
the ___ security model assigns permissions by security clearance and subject clearance
Lattice Based Access Control
the 8 rules of the Graham-Denning security model are:
- ___
- ___
- ___
- Read Object
- Create Object
- Destroy Object
- Create Subject
- Destroy Subject
- Transfer Access
- Grant Access
- Delete Access
the 8 rules of the Graham-Denning security model are:
- Transfer Access
- Grant Access
- Delete Access
- ___
- ___
- ___
- Create Subject
- Destroy Subject
- Read Object
- Create Object
- Destroy Object
the 8 rules of the Graham-Denning security model are:
- Transfer Access
- Grant Access
- Delete Access
- Read Object
- Create Object
- Destroy Object
- ___
- ___
- Create Subject
8. Destroy Subject
The HRU security model is an extension of the ___ model, but differs in that it ___
Graham-Denning; considers Subjects to be Objects too
the 6 primitive operations in the HRU security model are:
- Create Object
- Create Subject
- Destroy Object
- Destroy Subject
- Enter into access matrix
- Delete from access matrix
the ___ security model separates end users from the backend data through “well-formed transactions” and “separation of duties”
Clark-Wilson
While most security models describe a Subject/Object dynamic, the ___ model uses Subject/Program/Object
Clark-Wilson
in the Clark-Wilson security model, a ___ is a series of operations that transition a system from one consistent state to another consistent state
well-formed transaction
the ___ security model acknowledges that when a Subject accesses an Object, they are mediated by a Program which limits the interface
Clark-Wilson
the ___ security model is designed to mitigate conflict of interest in commercial organizations
Brewer-Nash (aka “Chinese Wall”)
the ___ security model creates an Information Barrier to ensure that actions at a higher security level are not noticed by a lower security level, to avoid interference
Brewer-Nash (aka “Chinese Wall”)
the 4 rules of the Take-Grant Protection Model are:
- Take (one subject can take rights from another)
- Grant (a subject can grant their rights to another)
- Create (a subject can create new objects)
- Remove (a subject can remove its rights over an object)
an Access Control Matrix is a table with columns for ___ and rows for ___. The cells indicate ___ for each subject toward each object
Objects; Subjects; Rights
The six columns/frameworks of the Zachman Framework are:
- What (data)
- How (function)
- Where (Network)
- Who (people)
- When (time)
- Why (motivation)
The six rows/roles of the Zachman Framework are:
- Planner
- Owner
- Designer
- Builder
- Programmer
- User