Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
28 Cards in this Set
- Front
- Back
Bell-LaPadula enforces what?
|
Confidentiality
|
|
Bell-LaPadula
SS Property |
No "read" up
|
|
Bell-LaPadula
Star "*" property |
No write down
|
|
Bell-LaPadula
Strong star "*"property |
No read or write up or down
|
|
Biba Model
|
Cannot read down to maintain integrity
|
|
Biba Model
|
Star "*" cannot write to a higher up to maintain integrity
|
|
Biba Model
|
Only protects integrity. Does not examine availability or confidentiality.
|
|
Clark-Wilson Model
|
Subjects must access data through an application and auditing is required.
|
|
Clark-Wilson Model
|
Subjects are restricted. A subject at one level of access read one set of data, where as a subject at another level of access has access to a different set of data.
|
|
Take-Grant Model
|
Another confidentiality based model
|
|
Brewer and Nash Model
|
Also called the Chinese Wall Model
|
|
Brewer and Nash Model
|
Prevents conflict of interest
|
|
Noninterference Model
|
make sure objects and subjects of different levels don't interfere with objects and subjects of other levels.
|
|
Graham Denning Model
|
Protection rules for which each object has an owner and a controller.
|
|
Lattice Model
|
Subjects of the lattice model are allowed to access an object only if the security level of the subject is equal to or greater than that of the object.
|
|
Orange Book
|
official name is "Trusted Computer System Evaluation Criteria".
|
|
Orange Book
|
Developed to evaluate stand alone systems
|
|
Orange Book Ratings
|
A - Verified protection (highest)
B - Mandatory security C - Discretionary D - Minimal |
|
Red Book
|
official name is "Trusted Network Interpretation"
|
|
Red Book
|
Examines integrity and availability
|
|
ITSEC
|
evaluates confidentiality, integrity, availability
|
|
Bell-LaPadula
|
a confidentiality model that disallows reading up and writing down.
|
|
Biba
|
an integrity model that prevents unauthorized users from making modifications and disallows reading down and writing up.
|
|
Clark-Wilson
|
an integrity model that uses access triple and limits rights to objects via applications.
|
|
Information Flow Security Model
|
tracks data to indentify if sensitive information is being transmitted to unprotected areas.
|
|
State Machine Model
|
an abstract math model where state variables represent the system state.
|
|
Lattice Model
|
a mathematically descriptive model that provides upper and lower bounds of authorized access.
|
|
Non-Interference Model
|
preventative controls that limit subjects from violating security policy and affecting each other when operating in different domains.
|