• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/28

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

28 Cards in this Set

  • Front
  • Back
Bell-LaPadula enforces what?
Confidentiality
Bell-LaPadula
SS Property
No "read" up
Bell-LaPadula
Star "*" property
No write down
Bell-LaPadula
Strong star "*"property
No read or write up or down
Biba Model
Cannot read down to maintain integrity
Biba Model
Star "*" cannot write to a higher up to maintain integrity
Biba Model
Only protects integrity. Does not examine availability or confidentiality.
Clark-Wilson Model
Subjects must access data through an application and auditing is required.
Clark-Wilson Model
Subjects are restricted. A subject at one level of access read one set of data, where as a subject at another level of access has access to a different set of data.
Take-Grant Model
Another confidentiality based model
Brewer and Nash Model
Also called the Chinese Wall Model
Brewer and Nash Model
Prevents conflict of interest
Noninterference Model
make sure objects and subjects of different levels don't interfere with objects and subjects of other levels.
Graham Denning Model
Protection rules for which each object has an owner and a controller.
Lattice Model
Subjects of the lattice model are allowed to access an object only if the security level of the subject is equal to or greater than that of the object.
Orange Book
official name is "Trusted Computer System Evaluation Criteria".
Orange Book
Developed to evaluate stand alone systems
Orange Book Ratings
A - Verified protection (highest)
B - Mandatory security
C - Discretionary
D - Minimal
Red Book
official name is "Trusted Network Interpretation"
Red Book
Examines integrity and availability
ITSEC
evaluates confidentiality, integrity, availability
Bell-LaPadula
a confidentiality model that disallows reading up and writing down.
Biba
an integrity model that prevents unauthorized users from making modifications and disallows reading down and writing up.
Clark-Wilson
an integrity model that uses access triple and limits rights to objects via applications.
Information Flow Security Model
tracks data to indentify if sensitive information is being transmitted to unprotected areas.
State Machine Model
an abstract math model where state variables represent the system state.
Lattice Model
a mathematically descriptive model that provides upper and lower bounds of authorized access.
Non-Interference Model
preventative controls that limit subjects from violating security policy and affecting each other when operating in different domains.