know the details about each of the access control models and their functions:
The state machine model ensures that all instances of subjects accessing objects are secure.
The information flow model is designed to prevent unauthorized, insecure, or restricted information flow.
The noninterference model prevents the actions of one subject from affecting the system state or actions of another subject.
The Take-Grant model dictates how rights can be passed from subject to another or from a subject to an object.
An access control matrix is a table of subjects and objects that indicates the actions or functions that each subject can perform on each object.
Bell-LaPadula subjects have a clearance level that allows them to access only those objects with corresponding classification levels and below, plus its based on need to know at the current level.
Biba prevents subjects w2ith lower security levels from writing to objects at higher security levels.
Clark-Wilson is an integrity model that relies on auditing to ensure that unauthorized subjects cannot access objects and that authorized users access objects properly.
Biba and Clark-Wilson enforce integrity.
Goguen-Meseguer and Sutherland focus on integrity.
Graham-Denning focuses on the secure creation and deletion of both subjects and objects.
Know the definitions of certification and accreditation.
Certification is the technical evaluation of each part of a computer system to assess its concordance with security standards.
Accreditation is the process of formal acceptance of a certified configuration from a designated authority.
Describe open and closed systems
Open systems are designed using industry standards and are usually easy to integrate with other open systems.
Closed systems are generally proprietary hardware and/or software. Their specifications are not nromally published, and they are usually harder to integrate with other systems.
Confinement, Bounds, and Isolation
Confinement restricts a process to reading from and writing to certain memory locations.
Bounds are the limits of memory a process cannot exceed when reading or writing.
Isolation is the mode a process runs in when it is confined through the use of memory bounds.
Objects and Subjects
Subjects are users or processes that make requests for access to a resource
Objects are the resource.
Security controls use access rules to limit access by a subject to an object.
Here is a list of classes of the TCSEC, ITSEC, and Common Criteria.
TCSEC ITSEC CC DESIGNATION
D F-D+E0 EAL0, EAL1 Minimal/no protection
C1 F-C1+E1 EAL2 Discretionary security mechanisms
C2 F-C2+E2 EAL3 Controlled access protection
B1 F-B1+E3 EAL4 Labeled security protection
B2 F-B2+E4 EAL5 Structured security protection
B3 F-B3+E5 EAL6 Security domains
A1 F-B3+E6 EAL7 Verified security design
A TCB or Trusted Computing Base is the combination of hardware, software, and controls that form a trusted base that enforces the security policy.
A security perimeter is the imaginary boundary that separates the TCB from the rest of the system. TCB components communicate with non-TCB components using trusted paths.
The reference monitor is a logical part of the TCB that confirms whether a subject has the right to sue a resource prior to granting access. The security kernel is the collection of the TCB components that implement the functionality of the reference monitor.
Common security capabilities include memory protection, virtualization, and trusted platform module (TPM).