Security Management Models - Chap 8

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/47

flashcard set

Earn XP

Description and Tags

Flashcards from Security Management Models Lecture Notes

Last updated 1:17 PM on 5/8/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

48 Terms

1
New cards

Framework

High-Level Structure & Guidelines. A broad set of best practices, standards, and guidelines that provide an overall structure for cybersecurity management.

2
New cards

Model

Theoretical Security Concept. A theoretical concept how security should be implemented to achieve specific security objectives, such as confidentiality, integrity, or availability.

3
New cards

Blueprint

Detailed Implementation Plan. A specific, detailed plan for implementing security controls in an organization, based on a chosen framework and model.

4
New cards

ISO/IEC 27002

Offer guidance for the management of InfoSec to individuals responsible for their organization’s security programs. Focused on a broad overview of the various areas of security, providing information on 127 controls over 10 areas

5
New cards

ISO/IEC 27001

Provides information on how to implement ISO/IEC 27002. How to set up an information security management system (ISMS)

6
New cards

Security architecture models

Illustrate how InfoSec is implemented in systems.

7
New cards

Confidentiality-focused models

Protect data secrecy.

8
New cards

Integrity-focused models

Ensure data accuracy and trustworthiness.

9
New cards

TCSEC (Trusted Computer System Evaluation Criteria)

An older DoD standard for evaluating computer system security. Also Known As: "Orange Book" – The cornerstone of the Rainbow Series (color-coded security documents).

10
New cards

Trusted Computing Base (TCB)

The hardware, firmware, and software responsible for enforcing a system’s security policy.

11
New cards

Reference Monitor Concept

A conceptual component of TCB that manages access controls. Ensures subjects (users/processes) can only access authorized objects (files/data).

12
New cards

Covert Channels in TCB

Unauthorized or hidden methods of data transfer that bypass security policies.

13
New cards

Common Criteria (CC)

An international standard (ISO/IEC 15408) for computer security certification. Successor to TCSEC and ITSEC.

14
New cards

Target of Evaluation (ToE)

The system or product being evaluated.

15
New cards

Protection Profile (PP)

A user-generated security requirements specification.

16
New cards

Security Target (ST)

A document detailing the ToE’s security properties.

17
New cards

Security Functional Requirements (SFRs)

A catalog of security functions provided by a product.

18
New cards

Evaluation Assurance Level (EAL)

Grading scale for security assurance.

19
New cards

Access Control

The method of regulating who can access specific resources and how they can use them.

20
New cards

Identification

Capturing the identity of the entity requesting access (e.g., username, ID card).

21
New cards

Authentication

Verifying the identity using credentials (e.g., passwords, biometrics).

22
New cards

Authorization

Granting specific permissions and access levels based on the entity’s role.

23
New cards

Accountability

Logging and tracking all access activities for auditing and compliance.

24
New cards

Least Privilege

Users are granted the minimum access necessary for their job.

25
New cards

Need-to-Know

Users are only given access to specific information needed for their current task.

26
New cards

Separation of Duties

Significant security tasks are divided among multiple individuals to prevent fraud and insider threats.

27
New cards

Directive Access Control

Policies and training to guide user behavior.

28
New cards

Deterrent Access Control

Discourages security violations.

29
New cards

Preventative Access Control

Stops incidents before they happen.

30
New cards

Detective Access Control

Identifies security incidents when they occur.

31
New cards

Corrective Access Control

Responds to and mitigates security breaches.

32
New cards

Recovery Access Control

Restores systems to normal operations after an incident.

33
New cards

Compensating Access Control

Provides alternative security measures when primary controls are insufficient.

34
New cards

Managerial Controls

Designed by strategic planners, implemented by security administrators.

35
New cards

Operational (Administrative) Controls

Integrated into daily business operations.

36
New cards

Technical Controls

Automated security mechanisms.

37
New cards

Mandatory Access Control (MAC)

Enforces strict classification levels on data and users. Users have no control over access permissions.

38
New cards

Discretionary Access Control (DAC)

Data owners control who can access resources. Users can share or restrict access at their discretion.

39
New cards

Nondiscretionary Access Control (NDAC)

Controlled by a central authority, not individual users.

40
New cards

Role-Based Access Control (RBAC)

Access tied to job roles.

41
New cards

Task-Based Access Control (TBAC)

Access tied to specific tasks or projects.

42
New cards

Bell-LaPadula (BLP) confidentiality model

A state machine reference model that helps ensure the confidentiality of an information system by means of mandatory access controls (MACs), data classification, and security clearances. BLP security rules prevent information from being moved from a level of higher security level to a level of lower security

43
New cards

simple integrity property

Permits a subject to have read access to an object only if the security level of the subject is either lower or equal to the level of the object

44
New cards

integrity * property

Permits a subject to have write access to an object only if the security level of the subject is equal to or higher than that of the object

45
New cards

Clark-Wilson integrity model

Designed for the commercial environment. Built upon principles of change control rather than integrity levels.

46
New cards

Integrity verification procedure (IVP)

Procedure that scans data and confirms its integrity

47
New cards

Transformation procedure (TP)

Procedure that only allows changes to a constrained data item

48
New cards

Brewer-Nash model—commonly known as a Chinese Wall

Is designed to prevent a conflict of interest between two parties. Requires users to select one of two conflicting sets of data, after which they cannot access the conflicting data

Explore top notes

note
AP Psych Unit 0 Vocab
Updated 555d ago
0.0(0)
note
Animal Studies of Attachment
Updated 532d ago
0.0(0)
note
Biological Molecules
Updated 1191d ago
0.0(0)
note
AP World Unit 4 Cramming
Updated 191d ago
0.0(0)
note
APUSH UNIT 5 FLASHCARDS
Updated 467d ago
0.0(0)
note
AP Psych Unit 0 Vocab
Updated 555d ago
0.0(0)
note
Animal Studies of Attachment
Updated 532d ago
0.0(0)
note
Biological Molecules
Updated 1191d ago
0.0(0)
note
AP World Unit 4 Cramming
Updated 191d ago
0.0(0)
note
APUSH UNIT 5 FLASHCARDS
Updated 467d ago
0.0(0)

Explore top flashcards

flashcards
HWH Chapter 15 ALL TERMS :)
33
Updated 717d ago
0.0(0)
flashcards
BIOENERGENETICS
28
Updated 1045d ago
0.0(0)
flashcards
IB Biology
365
Updated 1131d ago
0.0(0)
flashcards
cogni
400
Updated 775d ago
0.0(0)
flashcards
High School Chemistry Unit 1
21
Updated 666d ago
0.0(0)
flashcards
Top 200 Drugs
550
Updated 702d ago
0.0(0)
flashcards
Sadlier Level F Unit 3
20
Updated 890d ago
0.0(0)
flashcards
HWH Chapter 15 ALL TERMS :)
33
Updated 717d ago
0.0(0)
flashcards
BIOENERGENETICS
28
Updated 1045d ago
0.0(0)
flashcards
IB Biology
365
Updated 1131d ago
0.0(0)
flashcards
cogni
400
Updated 775d ago
0.0(0)
flashcards
High School Chemistry Unit 1
21
Updated 666d ago
0.0(0)
flashcards
Top 200 Drugs
550
Updated 702d ago
0.0(0)
flashcards
Sadlier Level F Unit 3
20
Updated 890d ago
0.0(0)