Shared Flashcard Set

Details

Security Architecture
Security Architecture Domain
33
Computer Science
Professional
03/11/2010

Additional Computer Science Flashcards

 


 

Cards

Term
B2
Definition

According to the Orange Book, which is the first security rating that requires covert channel analysis?

Term
CLARK WILSON INTEGRITY MODEL
Definition

Which security model has these charateristics?

  • (TP) Transaction procedure.  Procedures that take the system from one valid state to another
  • IVP Integrity Verification Process. Procedures that test the constrained data items to conform to integrity constraints
  • CDI Contrained data items.  Data subject to integrity controls
  • UDI Uncontrained data items.  Data not subject to integrity controls

  •  Access control is specified in access triples consisting of (user, TP, data)
Term
CPU State
Definition

What device can operate in a:

 

Ready State - ready to process

Supervisory State - executing priviledge routine

Problem state - executing an application

Wait State - waiting for a specific event to finish

Term
Ready State
Definition

CPU operates in a "ready to process" state is referred as?

Term
Supervisory State
Definition

The CPU operates in a "executing a priviledge routine" is referred as?

Term
Problem State
Definition

The CPU is operating in a "executing an application" state is referred as?

Term
Wait State
Definition

The CPU is operating in a "waiting for a specific event to finish" is referred to as?

Term

NON-LINEAR LAYER

KEY ADDITION LAYER

LINEAR MIXING LAYER

Definition

Rijindael employs a round transformation that consists of multiple layers of transformations.  What are those layers?

Term
Common Criteria
Definition

What evaluation criteria evaluates a product against a protection profile?

Term
WEP
Definition

Which IEEE 802.11 protocol is used to provide confidentiality of wireless transmissions?

Term
RING 0
Definition

In a ring protection system, where is the operating system security kernel located?

Term
SCALAR
Definition

Which type of processor can only process one instruction at a time?

Term
Security Target
Definition

With respect to the Common Criteria, what describes the statement of security claims for a particular IT product / system?

Term
REFERENCE MONITOR
Definition

What describes the system component that controls all of subjects to objects, works as an abstract machine and mediates all access to object, protecting objects from unauthorized access and modification?

Term
7
Definition
How many assurance levels are defined in the CC model?
Term
NIACAP
Definition

The following phases of accrediation is part of the?

 

post accrediation

validation

definition

verification

Term
SUPERSCALAR
Definition
Which processor enables the concurrent execution of multiple instructions in the same pipeline stage?
Term
Biba Model
Definition

Which statement is true for which security model ?

 

  • A subject cannot read data at a lower integrity level
  • A subject at integrity level X can only invoke a subject at the same or lower  integrity levels
  • A subject cannot modify an object in a higher integrity level
Term
CLARK-WILSON Model
Definition

In which manner should integrity labels should be assigned when,

  • objects (not subjects) should be assigned as one of two integrity  levels (UDI, CDI),
  • while subjects (not objects) should be assigned one of two integrity levels (certified, TP, uncertified procedures)?

 

 

Term
SIMPLE SECURITY RULE
Definition
What rule states that a subject has only read access to objects whose security level is below the subjects current clearance level.  This prevents a subject from getting access to information available in security levels higher than its current clearance level?
Term
BELL-LAPADULA security model
Definition

What security model rule states:

 

  • Supports both Mandatory and Discretionary Access Control
  • Is a Multilevel security system for enforcing access control in government and military applications
  • Enforces the simple security rule and the *-property rule
Term
EAL
Definition
What Common Criteria terminology represents a level of confidence in the security functions of an IT product or system?
Term

Controlled Access Protection

C2

Definition
What hierarchical division of security level requires object/subject residual information protection?
Term

A1 - Verified Design

Definition

What hierarchical division of security level requires

formal security verification methods to assure that the mandatory and discretionary security controls employed in the system can effectively protect classified or other sensitive information stored or processed by the system?

Term

B - Mandatory protection

Definition

What hierarchical division of security levels ensures

mandatory access control is enforced by security labels?

 

 

 

 

Term

B3 - Security Domains

Definition

What level of security requires security notifications to be sent, system must recover without compromising system, security admin role defined?

Term

B2 - Structured Protection

 

Definition

What security level requires security labels are required, trusted path & covert channel analysis performed, and separate administration functionality is provided?

Term

B1 - Labeled Security

 

Definition

What security level requires each data object must contains classification label and each subject must have a clearance level?

Term

C1 -Discretionary Security Protection

Definition

What level of security requires protected execution domain and discretionary access control?

Term

D - Minimal Security

Definition

What level of security requires the system provides minimal security?

Term
*-integrity axiom
Definition
What rule states that a subject cannot modify an object in a higher integrity level?
Term
Multi-level security mode, Compartmental security mode, Dedicated security model, and System-High security mode
Definition
What are the Security modes of operation that describe the security state of a system as it is actually operating?
Supporting users have an ad free experience!