Podcast
Questions and Answers
Which of the following is NOT a characteristic of a covert channel?
Which of the following is NOT a characteristic of a covert channel?
- It requires cooperation between a sender and a receiver
- It is an unauthorized communications channel within a system
- It is used to transfer information without exceeding authorized access
- It utilizes legitimate communication pathways within the system (correct)
What is the main reason why MAC cannot protect against covert channels?
What is the main reason why MAC cannot protect against covert channels?
- Covert channels exploit vulnerabilities in the system's operating system
- MAC policies are not designed to address covert channels
- The encryption methods used in MAC are easily circumvented by covert channels
- MAC focuses on controlling access to information through authorized channels (correct)
Which of these represents a covert channel type?
Which of these represents a covert channel type?
- Utilizing a system's timer to convey information
- Modifying data in a file to signal information (correct)
- Accessing a restricted file using a valid password
- Using a shared network drive to transfer information
In the context of lattice-based access control (LBAC), what does a lattice define?
In the context of lattice-based access control (LBAC), what does a lattice define?
What is one of the main limitations of mandatory access control (MAC) policies?
What is one of the main limitations of mandatory access control (MAC) policies?
What does the term 'cooperating entities' imply in the context of covert channels?
What does the term 'cooperating entities' imply in the context of covert channels?
Which of these is NOT a recommended reading material for further study on MAC, according to the provided text?
Which of these is NOT a recommended reading material for further study on MAC, according to the provided text?
According to the provided text, which of the following statements accurately describes the relationship between MAC and covert channels?
According to the provided text, which of the following statements accurately describes the relationship between MAC and covert channels?
What is a security label that a user cannot have according to the labeling rules?
What is a security label that a user cannot have according to the labeling rules?
If Alice's security label is Bank1, what principals does she have associated?
If Alice's security label is Bank1, what principals does she have associated?
What is the principal's associated fixed security label in the given labeling rules?
What is the principal's associated fixed security label in the given labeling rules?
Which of the following was an early implementation of Mandatory Access Control (MAC)?
Which of the following was an early implementation of Mandatory Access Control (MAC)?
In the context of SELinux, what does the 'subject security level' represent?
In the context of SELinux, what does the 'subject security level' represent?
What does the type of an object refer to in SELinux?
What does the type of an object refer to in SELinux?
What aspect of SELinux is primarily focused on enhancing security?
What aspect of SELinux is primarily focused on enhancing security?
Which organization was involved in earlier projects related to SELinux?
Which organization was involved in earlier projects related to SELinux?
What is a fundamental characteristic of Mandatory Access Control (MAC)?
What is a fundamental characteristic of Mandatory Access Control (MAC)?
Which MAC model is primarily concerned with maintaining confidentiality?
Which MAC model is primarily concerned with maintaining confidentiality?
In the context of MAC, what is the definition of a 'subject'?
In the context of MAC, what is the definition of a 'subject'?
What aspect does the Biba model focus on within MAC policies?
What aspect does the Biba model focus on within MAC policies?
Which model is associated with the concept of separation of duty?
Which model is associated with the concept of separation of duty?
What does the Chinese Wall model primarily aim to prevent?
What does the Chinese Wall model primarily aim to prevent?
What is the purpose of assigning a security class in information flow models?
What is the purpose of assigning a security class in information flow models?
What is NOT a characteristic of Mandatory Access Control?
What is NOT a characteristic of Mandatory Access Control?
What does the ∗-property primarily prevent?
What does the ∗-property primarily prevent?
Which statement is true regarding the strong ∗-property?
Which statement is true regarding the strong ∗-property?
In the Bell-LaPadula model, what does write access often imply?
In the Bell-LaPadula model, what does write access often imply?
How does the Bell-LaPadula model couple mandatory and discretionary controls?
How does the Bell-LaPadula model couple mandatory and discretionary controls?
What is the significance of users being able to login with any label dominated by their security clearance?
What is the significance of users being able to login with any label dominated by their security clearance?
Which aspect of the ∗-property includes provisions against unauthorized data destruction?
Which aspect of the ∗-property includes provisions against unauthorized data destruction?
What does the Bell-LaPadula model generally illustrate?
What does the Bell-LaPadula model generally illustrate?
Which of the following describes how users connect to the system with regards to their security classes?
Which of the following describes how users connect to the system with regards to their security classes?
According to the Chinese Wall model, what does the "*-property" imply for a subject's access to data?
According to the Chinese Wall model, what does the "*-property" imply for a subject's access to data?
Which of the following is NOT a rule of the Chinese Wall model?
Which of the following is NOT a rule of the Chinese Wall model?
What does the "Simple Security Rule" of the Chinese Wall model allow a subject to do?
What does the "Simple Security Rule" of the Chinese Wall model allow a subject to do?
What is the purpose of the "Chinese Wall" in the model?
What is the purpose of the "Chinese Wall" in the model?
What is a conflict of interest class (CIC) in the context of the Chinese Wall model?
What is a conflict of interest class (CIC) in the context of the Chinese Wall model?
What is the primary aim of integrity-based mandatory policies such as the Biba model?
What is the primary aim of integrity-based mandatory policies such as the Biba model?
In the Biba model, what does the integrity level of an object reflect?
In the Biba model, what does the integrity level of an object reflect?
What does the No Read Down rule in the Biba model imply?
What does the No Read Down rule in the Biba model imply?
Which property allows a subject to write to an object in the Biba model?
Which property allows a subject to write to an object in the Biba model?
How do the BLP and Biba models differ in terms of information flow direction?
How do the BLP and Biba models differ in terms of information flow direction?
What is the significance of the integrity level assigned to a subject in the Biba model?
What is the significance of the integrity level assigned to a subject in the Biba model?
In the context of mandatory access control, what is a common feature of the Biba model?
In the context of mandatory access control, what is a common feature of the Biba model?
What does the term 'lattice of security classes' refer to in relation to BLP and Biba models?
What does the term 'lattice of security classes' refer to in relation to BLP and Biba models?
Flashcards
Chinese Wall Model
Chinese Wall Model
A security model that ensures subjects (users) cannot access data that creates a conflict of interest. It separates data into different 'company datasets' and 'conflict of interest classes' to prevent unauthorized access.
Simple Security Rule
Simple Security Rule
A subject can only read data from either the same company datasets they've already accessed (within the wall) or from completely different conflict of interest classes.
*-Property
*-Property
A subject can only write to data if they can already read it according to the Simple Security Rule, and the data is within the same company dataset.
Company Dataset
Company Dataset
Signup and view all the flashcards
Conflict of Interest Class
Conflict of Interest Class
Signup and view all the flashcards
Mandatory Access Control (MAC)
Mandatory Access Control (MAC)
Signup and view all the flashcards
Untrusted Subjects in MAC
Untrusted Subjects in MAC
Signup and view all the flashcards
Bell-LaPadula Model
Bell-LaPadula Model
Signup and view all the flashcards
Biba Model
Biba Model
Signup and view all the flashcards
Separation of Duty
Separation of Duty
Signup and view all the flashcards
Covert Channel
Covert Channel
Signup and view all the flashcards
Information Flow (IF) Models
Information Flow (IF) Models
Signup and view all the flashcards
Types of Covert Channels
Types of Covert Channels
Signup and view all the flashcards
Storage Channel
Storage Channel
Signup and view all the flashcards
Timing Channel
Timing Channel
Signup and view all the flashcards
Lattice-Based Access Control (LBAC)
Lattice-Based Access Control (LBAC)
Signup and view all the flashcards
MAC Limitations
MAC Limitations
Signup and view all the flashcards
MAC Terminology
MAC Terminology
Signup and view all the flashcards
Labeling Rules in Access Control
Labeling Rules in Access Control
Signup and view all the flashcards
Top Security Label (⊤)
Top Security Label (⊤)
Signup and view all the flashcards
Dominated Security Labels
Dominated Security Labels
Signup and view all the flashcards
Principals in MAC
Principals in MAC
Signup and view all the flashcards
MAC with Principal-Based Access Control
MAC with Principal-Based Access Control
Signup and view all the flashcards
SELinux (Security-Enhanced Linux)
SELinux (Security-Enhanced Linux)
Signup and view all the flashcards
Subjects, Objects, Domains, and Types in SELinux
Subjects, Objects, Domains, and Types in SELinux
Signup and view all the flashcards
What is the Biba model?
What is the Biba model?
Signup and view all the flashcards
What is the 'No Read Down' rule in Biba?
What is the 'No Read Down' rule in Biba?
Signup and view all the flashcards
What is the 'No Write Up' rule in Biba?
What is the 'No Write Up' rule in Biba?
Signup and view all the flashcards
How do Biba and Bell-LaPadula (BLP) models relate?
How do Biba and Bell-LaPadula (BLP) models relate?
Signup and view all the flashcards
How do Biba's rules compare to BLP's?
How do Biba's rules compare to BLP's?
Signup and view all the flashcards
Can a single label be used for both confidentiality and integrity?
Can a single label be used for both confidentiality and integrity?
Signup and view all the flashcards
Why is the Biba model important?
Why is the Biba model important?
Signup and view all the flashcards
What is the ∗-property in MAC?
What is the ∗-property in MAC?
Signup and view all the flashcards
How does the ∗-property protect data?
How does the ∗-property protect data?
Signup and view all the flashcards
What is the meaning of 'write access' in BLP?
What is the meaning of 'write access' in BLP?
Signup and view all the flashcards
What operations are typically focused on in BLP?
What operations are typically focused on in BLP?
Signup and view all the flashcards
How do mandatory and discretionary access controls work together in BLP?
How do mandatory and discretionary access controls work together in BLP?
Signup and view all the flashcards
Can users login with a label less sensitive than their clearance in BLP?
Can users login with a label less sensitive than their clearance in BLP?
Signup and view all the flashcards
What is the strong ∗-property?
What is the strong ∗-property?
Signup and view all the flashcards
How does the strong ∗-property mitigate data destruction?
How does the strong ∗-property mitigate data destruction?
Signup and view all the flashcards
Study Notes
Access Control
- Mandatory Access Control (MAC) enforces access control based on rules set by a central authority.
- MAC doesn't rely on ownership concepts.
- MAC distinguishes between users and subjects. Users are trusted, subjects are not.
- Users are trusted not to disclose sensitive information outside the system.
- Subjects aren't trusted – they may contain malicious code.
- Subjects and objects are assigned security levels (security classes).
- Security level of objects reflects the information's sensitivity.
- Security level of subjects reflect user trustworthiness.
- Requests to access objects are regulated by the subjects' security classes.
Information Flow Models
- Information flow (IF) models by Denning (1976) focus on information flow between security classes.
- An object is viewed as a container of information, e.g., files or database relations.
- Information flow is controlled by assigning a security class or label to each object.
Definition 1: Information Flow Model
- A triple (SC, →, ⊕) defines an IF model, where:
- SC is a set of security classes (access classes or security labels)
- → (may-flow) is a binary relation between security classes.
- ⊕ (class combiner operator) combines two security classes.
Information Flow Models: Denning's Axioms
- Axiom 1: SC is finite.
- Axiom 2: The may-flow relation (→) is a partial order.
- Axiom 3: SC has a least element (w.r.t.).
- Axiom 4: ⊕ is a least upper bound operator.
Dominance
- A > B (A dominates B) if B → A. A strictly dominates B if A > B and A ≠B.
Confidentiality-based Policies: Bell-LaPadula
- Aim: prevents information leaks to unauthorized subjects.
- Subjects and objects are assigned security levels.
- The security level of the object reflects its sensitivity
- The security level of the subject reflects the user's trustworthiness
- Access requests are regulated by security classes.
- A subject (user) can connect to the system at a security class dominated by its security class.
The Bell-LaPadula Model
- Key idea: augment discretionary access control (DAC) with MAC to enforce information flow policies.
- Two-step approach is used:
- Establish a discretionary access control matrix D.
- Authorize operations through mandatory access controls.
- Initially defined for read and write operations (R,W)
The Bell-LaPadula: Rules (No Read Up - No Write Down)
- Simple Security (ss-): subject s can read object o if s's level is at least as high as o's level (s ≥ o).
-
- Property (or *-): subject s can write to object o if s's level is at most as low as o's level (s ≤ o).
Integrity-based Policies: Biba
- Aim: prevents unauthorized modification of information.
- Subjects and objects are assigned integrity levels.
- Object's integrity level reflects trust and potential damage.
- Subject's integrity level reflects trustworthiness of inserting/modifying/deleting information.
- Requests are regulated by integrity classes.
The Biba Model
- Rules are the opposite ("No read down, no write up")
- Simple integrity property: s can read o only if subject's integrity level is ≤ object's integrity level (w(s) ≤ w(o))
- Integrity *-property: s can write to o only if subject's integrity level is > object's integrity level (w(s) > w(o)) -w means integrity function
- The Biba and Bell-LaPadula rules are the "duals" of each other.
Combining BLP and Biba
- Models can use the same lattice of security classes (although information flows in different directions).
Case 1: Single Label
- Uses a single label for confidentiality and integrity.
- Subjects can read/write only if both subject and object have the same security class.
Case 2: Independent Labels, Same Directions
- Uses independent labels for confidentiality and integrity (based on two separate lattices).
- Subject can read if its confidentiality level is greater than or equal to the object's and its integrity level is less than or equal to the object's.
Case 3: Independent Labels, Opposite Directions
- Uses independent labels for confidentiality and integrity (and separate lattices).
- The highest confidentiality level has the lowest integrity and vice versa.
Separation of Duty: Chinese Wall
- Aims to prevent conflicts of interest and inadvertent disclosure in advisory systems (e.g., law firms, consultants).
- Separate datasets from competitors
- When an object/dataset is accessed, create a "wall" around it, preventing access to a different dataset by the same subject.
Chinese Wall Model
- A subject can access an object if it's in the same dataset or belongs to a different conflict of interest class.
- Write access is restricted to the datasets the subject has read access, and no other datasets.
Criticisms: Chinese Wall
- The rules limit operational flexibility since a user may not read information or write it to more than one company.
MAC Implementations
- Early implementations (e.g., Honeywell SCOMP, US Air Force SACDIN, Boeing MLS LAN) were military-oriented.
MAC Implementations: SELinux
- SELinux adds a MAC layer for Linux. It uses domains (subject levels), types (object levels) and classes for objects. It uses access and labeling rules.
MAC Implementations: AppArmor
- AppArmor a MAC for Linux that extends Unix DAC model.
- AppArmor is described using file paths and capabilities (privileges).
MAC Implementations: MIC
- Windows's Mandatory Integrity Control (MIC) enforces integrity rules, ensuring a subject's integrity level is greater than or equal to an object's to write.
MAC and Covert Channels
- Covert channels are unauthorized intra-system channels that circumvent security policies, despite subjects maintaining access permissions.
- Covert channels can be based on timing, storage and network access.
Concluding Remarks on MAC
- MAC is based on regulations dictated by a central authority.
- MAC differentiates between trusted users and untrusted subjects.
- Lattice-based access controls (LBAC) define security levels for objects and subjects.
- MAC policies typically safeguard information flow over overt (legitimate) channels, but not over covert channels.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.