1. Security models include state machine, information flow, noninterference, Take-Grant, access control matrix, Bell-LaPadula, Biba, Clark-Wilson, Brewer and Nash (aka Chinese Wall), Goguen-Meseguer, Sutherland, and Graham-Denning.
hardware and software elements used to enforce the security policy (these elements are called the TCB), the
security perimeter distinguishing and separating TCB components from non-TCB components, and
the reference monitor that serves as an access control device across the security perimeter.
A. Formal acceptance of a stated system configuration
B. A technical evaluation of each part of a computer system to assess its compliance with security standards
C. A functional evaluation of the manufacturer’s goals for each hardware and software component to meet integration standards
D. A manufacturer’s certificate stating that all components were installed and configured correctly
A. Formal acceptance of a stated system configuration
B. A functional evaluation of the manufacturer’s goals for each hardware and software component to meet integration standards
C. Acceptance of test results that prove the computer system enforces the security policy
D. The process to specify secure communication between machines
A. A system designed around final, or closed, standards
B. A system that includes industry standards
C. A proprietary system that uses unpublished protocols
D. Any machine that does not run Windows
A. A process that can run only for a limited time
B. A process that can run only during certain times of the day
C. A process that can access only certain memory locations
D. A process that controls access to an object
A. A resource a user or process wants to access
B. A user or process that wants to access a resource
C. A list of valid access rules
D. The sequence of valid access types
A. A security component that stores attributes that describe an object
B. A document that lists all data classification types
C. A list of valid access rules
D. A mechanism that limits access to an object
A. System accreditation
B. Site accreditation
C. Application accreditation
D. Type accreditation
A. Two
B. Three
C. Four
D. Five
A. Hosts on your network that support secure transmissions
B. The operating system kernel and device drivers
C. The combination of hardware, software, and controls that work together to enforce a security policy
D. The software and controls that certify a security policy
A. The boundary of the physically secure area surrounding your system
B. The imaginary boundary that separates the TCB from the rest of the system
C. The network where your firewall resides
D. Any connections to your computer system
A. TCB partition
B. Trusted library
C. Reference monitor
D. Security kernel
A. A security model states policies an organization must follow.
B. A security model provides a framework to implement a security policy.
C. A security model is a technical evaluation of each part of a computer system to assess its concordance with security standards.
D. A security model is the process of formal acceptance of a certified configuration.
A. Bell-LaPadula and Take-Grant
B. Biba and Clark-Wilson
C. Clark-Wilson and Bell-LaPadula
D. Bell-LaPadula and Biba
A. Bell-LaPadula
B. Biba
C. Clark-Wilson
D. Brewer and Nash
A. * (star) Security Property
B. No write up property
C. No read up property
D. No read down property
A. Write down
B. Read up
C. No write up
D. No read down
A. Perturbation
B. Polyinstantiation
C. Aggregation
D. Declassification
A. Separation of duties
B. Access control matrix
C. Biba
D. Clark-Wilson
A. Graham-Denning model
B. Deployment modes
C. Trusted computing base
D. Chinese Wall
A. Object
B. Interface
C. Programming language
D. Subject