Chapter 8 - Security Management Models Flashcards

(23 cards)

1
Q

Blueprint

A

In InfoSec, a framework or security model customized to an organization, including implementation details.F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Framework

A

In InfoSec, a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including InfoSec policies, security education and training programs, and technological controls. Also known as a security model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reference monitor

A

Within TCB, a conceptual piece of the system that manages access controls – in other words, it mediates all access to objects by subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Covert channels

A

Unauthorized or unintended methods of communications hidden inside a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Storage channels

A

A TCSEC-defined covert channel that communicates by modifying a stored object, such as in steganography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Timing channels

A

A TSEC-defined covert channel that communicates by managing the relative timing of events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trusted Computer System Evaluation Criteria (TCSEC)

A

A deprecated (no longer used) DoD system certification and accreditation standard that defined the criteria for assessing the access controls in a computer system. Also known as the rainbow series due to the color coding of the individual documents that made up the criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trusted Computing Base (TCB)

A

Under TCSEC, the combination of all hardware, firmware, and software responsible for enforcing the security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Technology System Evaluation Criteria (ITSEC)

A

An international set of criteria for evaluating computer systems, very similar to TSEC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common Criteria for Information Technology Security Evaluation

A

An international standard (ISO/IEC 15408) for computer security certification that is considered the successor to TCSEC and ITSEC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access control

A

The selective method by which systems specify who may use a particular resource and how they may use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Least privilege

A

The data access principle that ensures no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary. Least privilege implies a need-to-know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Need-to-know

A

The principle of limiting users’ access privileges to only the specific information required to perform their assigned tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Separation of duties

A

The information security principle that requires significant tasks to be split up so that more than one individual is required to complete them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Capabilities table

A

In a lattice-based access control, the row of attributes associated with a particular subject (such as a user)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Discretionary Access Controls (DACs)

A

Access controls that are implemented at the discretion or option of the user.

17
Q

Dumpster Diving

A

An information attack that involves searching through a target organization’s trash and recylcing bins for sensitive information

18
Q

Lattice-based access control

A

A variation of the MAC form of access control, which assigns users a matrix of authorizations for particular areas of access, incorporating the information assets of subjects such as users and objects.

19
Q

Mandatory Access Control (MAC)

A

A required, structured data classification scheme that rates each collection of information as well as each user. These ratings are often referred to as sensitivity or classification levels.

20
Q

Security clearance

A

A personal security structure in which each user of an information asset is assigned an authorization level that identifies the level of classified information he or she is “cleared” to access.B

21
Q

Nondiscretionary controls

A

Access controls that are implemented by a central authority.

22
Q

Bell-LaPadula (BLP) confidentiality model

A

A confidentiality model or “state machine reference model” that ensures the confidentiality of the modeled system by using MACs, data classification, and security clearances.

23
Q

Biba integrity model

A

An access control model that is similar to BLP and is based on the premise that higher levels of integrity are more worhty of trust than lower levels.