Podcast Beta
Questions and Answers
What is a key reason that access control is deemed essential in information security management?
Which model is recommended for InfoSec management due to its focus on data integrity?
What is a fundamental element of effective InfoSec management practices?
How can an organization effectively customize a recommended InfoSec management model?
Signup and view all the answers
What emerging trend is significant in the certification and accreditation of U.S. information systems?
Signup and view all the answers
What is the primary focus of the Clark-Wilson Integrity Model?
Signup and view all the answers
Which of the following is NOT a component of the Clark-Wilson Integrity Model?
Signup and view all the answers
Which principle of the Clark-Wilson Integrity Model helps prevent misuse by ensuring only authorized users can perform specific tasks?
Signup and view all the answers
In the context of the Clark-Wilson Integrity Model, what is meant by 'well-formed transactions'?
Signup and view all the answers
How does the Clark-Wilson Integrity Model relate to traditional security models?
Signup and view all the answers
What is the primary focus of the Clark-Wilson integrity model?
Signup and view all the answers
Which of the following elements is NOT part of the Clark-Wilson integrity model?
Signup and view all the answers
Which principle is NOT a part of the change control framework in the Clark-Wilson integrity model?
Signup and view all the answers
In the Clark-Wilson model, what is meant by 'well-formed transactions'?
Signup and view all the answers
What is the purpose of the Integrity Verification Procedure (IVP) in the Clark-Wilson integrity model?
Signup and view all the answers
Which of the following pairs of elements are included in the Clark-Wilson integrity model?
Signup and view all the answers
What aspect does the Clark-Wilson integrity model emphasize for ensuring the integrity of data?
Signup and view all the answers
Which of the following describes a ‘transformation procedure’ (TP) in the Clark-Wilson integrity model?
Signup and view all the answers
What is meant by 'internal consistency' in the Clark-Wilson integrity model?
Signup and view all the answers
What does the term 'constrained data item' (CDI) indicate in the Clark-Wilson model?
Signup and view all the answers
Which of the following is NOT a requirement under the Clark-Wilson model?
Signup and view all the answers
In the context of the Clark-Wilson model, ‘well-formed transactions’ are crucial because they help to ensure what?
Signup and view all the answers
What is the main limitation of the Clark-Wilson integrity model?
Signup and view all the answers
The Clark-Wilson model's requirement for 'execution by subjects on a restricted set of programs' aids in achieving what?
Signup and view all the answers
Study Notes
Other Forms of Access Control
- Content-dependent access controls: Access depends on the information's content
- Constrained user interfaces: Designed to limit what information a user can access
- Temporal (time-based) isolation: Access to information is restricted by time of day
Security Architecture Models
- Illustrate InfoSec implementations
- Can help organizations rapidly improve through adaptation
Trusted Computing Base Part 1
- Trusted Computer System Evaluation Criteria (TCSEC): DoD standard for assessing computer system access controls
- Trusted Computing Base (TCB): Enforces security policy, combining hardware, firmware, and software
- Reference monitor: Manages access controls within the TCB
Trusted Computing Base Part 2
- Covert channels: Unauthorized communication methods hidden within a computer system
- Storage channels: Communicate by modifying stored objects
- Timing channels: Transmit information by manipulating event timing
Trusted Computing Base Part 3
- TCSEC protection levels:
- D: Minimal protection
- C: Discretionary protection
- B: Mandatory protection
- A: Verified protection
Information Technology System Evaluation Criteria
- ITSEC: International criteria for evaluating computer systems, similar to TCSEC
- Target of Evaluation (ToE) is compared to security function specifications
- E1 (lowest) to E6 (highest) rating scale
The Common Criteria
- Common Criteria for Information Technology Security Evaluation: International computer security certification standard
- Considered successor to TCSEC and ITSEC
- Terminology:
- Target of Evaluation (ToE)
- Protection Profile (PP)
- Security Target (ST)
- Security Functional Requirements (SFRs)
- Evaluation Assurance Levels (EAL)
The Common Criteria (continued)
- EAL rating scale:
- EAL1: Functionally Tested
- EAL2: Structurally Tested
- EAL3: Methodically Tested and Checked
- EAL4: Methodically Designed, Tested, and Reviewed
- EAL5: Semi-formally Designed and Tested
- EAL6: Semi-formally Verified Design and Tested
- EAL7: Formally Verified Design and Tested
Bell-LaPadula Confidentiality Model
- Ensures confidentiality using mandatory access controls (MACs), data classification, and security clearances
- Access modes:
- Simple security: Prevents subjects with lower clearance from reading objects with higher clearance
-
- (Star) property: Prevents high-level subjects from sending messages to lower-level objects
Biba Integrity Model
- Based on the principle that higher integrity levels are more trustworthy
- Assigns integrity levels to subjects and objects using:
- Simple integrity property (read): Subjects can read objects only if their security level is lower or equal
- Integrity * property (write): Subjects can write to objects only if their security level is equal or higher
Clark-Wilson Integrity Model
- Based on change control principles to maintain integrity
- Change control principles:
- No unauthorized changes by authorized subjects
- No unauthorized changes by authorized subjects
- Maintenance of internal and external consistency
- Internal consistency: System functions as expected
- External consistency: System data aligns with external data sources
- Controls:
- Subject authentication and identification
- Access to objects via well-defined transactions
- Subject execution on a limited set of programs
- Elements:
- Constrained data item (CDI)
- Unconstrained data item
- Integrity verification procedure (IVP)
- Transformation procedure (TP)
Graham-Denning Access Control Model
- Focuses on a set of objects, subjects, and rights
- Subjects:
- Processes
- Domains (constraints that control subject access to objects)
- Rights determine how subjects interact with passive objects.
Graham-Denning Access Control Model (continued)
- Eight primitive protection rights:
- Create object
- Create subject
- Delete object
- Delete subject
- Read access right
- Grant access right
- Delete access right
- Transfer access right
Harrison-Ruzzo-Ullman Model
- Defines a method for modifying access rights and managing subjects and objects
- Built on an access control matrix with generic rights and commands:
- Create subject/create object
- Enter right X into
- Delete right X from
- Destroy subject/destroy object
Brewer-Nash Model (Chinese Wall)
- Designed to prevent conflicts of interest between parties
- Requires users to select one of two conflicting data sets, preventing access to the conflicting data
Security Management Models
- U.S. government-sanctioned models
- Explain the importance of access control in InfoSec management
- Recommend InfoSec management models that can be tailored to individual organizations
- Describe fundamental elements of key InfoSec management practices
- Discuss emerging trends in U.S. Information Security certification and accreditation
### Objectives
- Describe dominant InfoSec blueprints, frameworks, and management models, including U.S. ones.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on various aspects of information security, including access controls, security architecture models, and the Trusted Computing Base. This quiz covers key concepts such as content-dependent access controls and covert channels, providing a comprehensive overview of Infosec principles.