Security Management Models - Chap 8

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

flashcard set

Earn XP

Description and Tags

Flashcards from Security Management Models Lecture Notes

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

Framework

High-Level Structure & Guidelines. A broad set of best practices, standards, and guidelines that provide an overall structure for cybersecurity management.

2
New cards

Model

Theoretical Security Concept. A theoretical concept how security should be implemented to achieve specific security objectives, such as confidentiality, integrity, or availability.

3
New cards

Blueprint

Detailed Implementation Plan. A specific, detailed plan for implementing security controls in an organization, based on a chosen framework and model.

4
New cards

ISO/IEC 27002

Offer guidance for the management of InfoSec to individuals responsible for their organization’s security programs. Focused on a broad overview of the various areas of security, providing information on 127 controls over 10 areas

5
New cards

ISO/IEC 27001

Provides information on how to implement ISO/IEC 27002. How to set up an information security management system (ISMS)

6
New cards

Security architecture models

Illustrate how InfoSec is implemented in systems.

7
New cards

Confidentiality-focused models

Protect data secrecy.

8
New cards

Integrity-focused models

Ensure data accuracy and trustworthiness.

9
New cards

TCSEC (Trusted Computer System Evaluation Criteria)

An older DoD standard for evaluating computer system security. Also Known As: "Orange Book" – The cornerstone of the Rainbow Series (color-coded security documents).

10
New cards

Trusted Computing Base (TCB)

The hardware, firmware, and software responsible for enforcing a system’s security policy.

11
New cards

Reference Monitor Concept

A conceptual component of TCB that manages access controls. Ensures subjects (users/processes) can only access authorized objects (files/data).

12
New cards

Covert Channels in TCB

Unauthorized or hidden methods of data transfer that bypass security policies.

13
New cards

Common Criteria (CC)

An international standard (ISO/IEC 15408) for computer security certification. Successor to TCSEC and ITSEC.

14
New cards

Target of Evaluation (ToE)

The system or product being evaluated.

15
New cards

Protection Profile (PP)

A user-generated security requirements specification.

16
New cards

Security Target (ST)

A document detailing the ToE’s security properties.

17
New cards

Security Functional Requirements (SFRs)

A catalog of security functions provided by a product.

18
New cards

Evaluation Assurance Level (EAL)

Grading scale for security assurance.

19
New cards

Access Control

The method of regulating who can access specific resources and how they can use them.

20
New cards

Identification

Capturing the identity of the entity requesting access (e.g., username, ID card).

21
New cards

Authentication

Verifying the identity using credentials (e.g., passwords, biometrics).

22
New cards

Authorization

Granting specific permissions and access levels based on the entity’s role.

23
New cards

Accountability

Logging and tracking all access activities for auditing and compliance.

24
New cards

Least Privilege

Users are granted the minimum access necessary for their job.

25
New cards

Need-to-Know

Users are only given access to specific information needed for their current task.

26
New cards

Separation of Duties

Significant security tasks are divided among multiple individuals to prevent fraud and insider threats.

27
New cards

Directive Access Control

Policies and training to guide user behavior.

28
New cards

Deterrent Access Control

Discourages security violations.

29
New cards

Preventative Access Control

Stops incidents before they happen.

30
New cards

Detective Access Control

Identifies security incidents when they occur.

31
New cards

Corrective Access Control

Responds to and mitigates security breaches.

32
New cards

Recovery Access Control

Restores systems to normal operations after an incident.

33
New cards

Compensating Access Control

Provides alternative security measures when primary controls are insufficient.

34
New cards

Managerial Controls

Designed by strategic planners, implemented by security administrators.

35
New cards

Operational (Administrative) Controls

Integrated into daily business operations.

36
New cards

Technical Controls

Automated security mechanisms.

37
New cards

Mandatory Access Control (MAC)

Enforces strict classification levels on data and users. Users have no control over access permissions.

38
New cards

Discretionary Access Control (DAC)

Data owners control who can access resources. Users can share or restrict access at their discretion.

39
New cards

Nondiscretionary Access Control (NDAC)

Controlled by a central authority, not individual users.

40
New cards

Role-Based Access Control (RBAC)

Access tied to job roles.

41
New cards

Task-Based Access Control (TBAC)

Access tied to specific tasks or projects.

42
New cards

Bell-LaPadula (BLP) confidentiality model

A state machine reference model that helps ensure the confidentiality of an information system by means of mandatory access controls (MACs), data classification, and security clearances. BLP security rules prevent information from being moved from a level of higher security level to a level of lower security

43
New cards

simple integrity property

Permits a subject to have read access to an object only if the security level of the subject is either lower or equal to the level of the object

44
New cards

integrity * property

Permits a subject to have write access to an object only if the security level of the subject is equal to or higher than that of the object

45
New cards

Clark-Wilson integrity model

Designed for the commercial environment. Built upon principles of change control rather than integrity levels.

46
New cards

Integrity verification procedure (IVP)

Procedure that scans data and confirms its integrity

47
New cards

Transformation procedure (TP)

Procedure that only allows changes to a constrained data item

48
New cards

Brewer-Nash model—commonly known as a Chinese Wall

Is designed to prevent a conflict of interest between two parties. Requires users to select one of two conflicting sets of data, after which they cannot access the conflicting data