• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
What does the Control Unit do?
Controls when instructions are processed by the CPU
What is Multitasking in regards to a CPU?
The act of executing more than one process at a time.
Describe the Security Kernal and Reference Monitor Relationship?
The reference monitor holds the access rules, and the security kernal enforces them.
Name three characteristics of the Clark-Wilson Model?
A. Access Triple
B. Integrity Model
C. addresses all three goals of integrity
What is the main characteristic of Dedicated Security Mode System?
All Users have access to all data.
What does Trusted Computer Base (TCB) encompass?
It encompasses every component that enforces the stated security policy, including software, hardware, and firmware.
What are the main characteristics of the BiBa Model?
A. Integrity Model
B. State Model
C. Do not allow unauthorized users to make modifications
I. “no write up” rule and “no read down” rule
II. Makes access decisions Based on the integrity levels of the subjects and the objects
What are the main characteristics of the Bell-La-Padula Model?
A. Deals with confidentiality and was built for US Military.
B. State Model
C. Do not allow unauthorized users to make modifications
I. “no write down” rule and “no read up” rule
II. Makes access decisions Based on the classification levels of the subjects.
What is a protection Profile?
Specific sets of funtional and assurance requirements for a category of products that fulfill a specific's customers needs.
What is a Securty Target (ST)?
it is written by the product or vendor, or developer, that explains the specifications of the product, including functionality and assurance requirements that will be used to evaluate the product against. "This is what our product does"
What is the Target of Evaluation (TOE)?
It is the product or system that will be evaluated and rated.
What are the two sets of security requirements defined by the Common Criteria?
Defines two sets of security requirements:
Functional Requirements
Assurance Requirements
In regards to the Common Criteria define Functional Requirements?
Functional Requirements - define the security behavior of the product.
In regards to the Common Criteria define Assurance Requirements?
Assurance Requirements - establish the confidence in the product based on how it satisfies the requirements and objectives and the correctness of the product's implementation.
What evaluation criterion went into the developmewnt of the Common Criteria?
a. TCSEC - Trusted Computer Security Evaluation Criteria

b. ITSEC - Information Technology Security Evaluation Criteria
c. CTCPEC - Canadian Trusted Computer Product Evauation criteria
d. Federal Criteria