• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/43

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

43 Cards in this Set

  • Front
  • Back

What are the 8 security models?

  1. Biba
  2. Bell LaPadula
  3. Access Matrix
  4. Take-Grant
  5. Clark-Wilson
  6. Multi-Level
  7. Mandatory Access Control
  8. Discretionary Access Control

What are the 3 information systems evaluation models?

  1. Common Criteria
  2. TCSEC
  3. ITSEC

What is a model?

A model is a simplified representation used to explain a real world system.

What does DAC stand for?

Discretionary access control.

What does RBAC stand for?

Role-based access control.

What does NRU stand for?

No Read Up

What does NWD stand for?

No Write Down

What is the Bell LaPadula Security Model?

  • State machine model that addresses the confidentiality of information.
  • NRU, NWD

What is the Biba security model?

The first formal INTEGRITY model, by preventing modifications to data by unauthorized persons.



NRD, NWU

What is the Clark-Wilson Security Model?

Integrity model with two principals: users and programs (called TPs) that operate on two types of data: UDIs and CDIs.

What does UDI stand for?

Unconstrained data items

What does CDI stand for?

Constrained data items

What does TP stand for?

Transformation procedures.



(Another word for programs)

What does IVP stand for?

Integrity Verification Procedure.

What is an IVP?

A type of TP that is used to transform UDIs into CDIs.

What 2 sets of rules does the Clark-Wilson Security Model use?

  1. Certification (C)
  2. Enforcement (E)

What is C1?

An IVP must ensure that CDIs are valid.

What is C2?

From a give CDI, a TP must transform the CDI from one valid state to another valid state.

What is C3?

Allowed relations (or "triples" that consist of a user, a TP, and one or more CDIs) must enforce separation of duties.

What is C4?

TPs must create a transaction log that contains all transaction details.

What is C5?

TPs that accept a UDI as input may perform only valid transactions on the UDI (to convert it to a CDI) or reject the UDI.

What is E1?

The system must permit only the TPs certified to operate on a CDI to actually do so.

What is E2?

The system must maintain the associations between users, TPs, and CDIs. The system must prevent operations outside of registered associations.

What is E3?

Every user must be authenticated before they may run a TP.

What is E4?

Only a TP's certifier may modify its associations.

What is the Access Matrix Security Model?

Two dimensional matrix that defines which subjects are permitted to access which objects.

What is the Multi-Level Security Model?

  • Used by a system that has several levels of security and is used by persons of varying security levels.
  • System will control access to objects according to their level and the level of the persons accessing them.

What is the MAC Security Model?

  • System controls access to resources
  • When a subject requests access to an object, the system examines the user's identity and access rights, and compares to access permissions of the object
  • System then permits or denies access

What is the DAC Security Model?

The owner of an object controls who and what may access it. Access is at the owner's DISCRETION.

What is the Role-based Access Control (RBAC) Security Model?

  • Access permissions are granted to "roles" instead of "persons".
  • Provides consistent access
  • Makes changes much easier, because they involve changes to roles instead of to individuals.

What is the Non-interference Security Model?

  • Specifies that low inputs and outputs will not be altered by high inputs and outputs.
  • In other words, activities at a higher security level cannot be detected (and will not interfere with) at lower security levels.
  • Prevents leakage of information from higher security levels to lower security levels.

What is the Information Flow Security Model?

  • Based upon flow of information rather than on access controls.
  • Data objects are assigned to a class or a level of security
  • Flow of objects are controlled by security policy that specifies where objects of various levels are permitted to flow.

What are the 6 evaluation models?

  1. Common Criteria
  2. TCSEC
  3. TNI
  4. ITSEC
  5. SEI-CMMI
  6. SSE-SMM

What is the formal name for Common Criteria?

Common Criteria for Information Technology Security Evaluation

What ISO # is Common Criteria?

ISO 15408

What is EAL1?

Functionally Tested.

What is EAL2?

Structurally tested.

What is EAL3?

Methodically Tested and Checked.

What does EAL stand for?

Evaluation Assurance Level.

What is EAL4?

Methodically Designed, Tested and Reviewed.

What is EAL5?

Semiformally Designed and Tested.

What is EAL6?

Semiformally Verified Design and Tested.

What is EAL7?

Formally Verified Design and Tested.