CYB.ISP

studied byStudied by 10 people
5.0(1)
Get a hint
Hint

Tranquility Principle

1 / 136

flashcard set

Earn XP

137 Terms

1

Tranquility Principle

This principle states that the classification of a subject or object does not change while it is being referenced

New cards
2

Principle of strong tranquility

This principle states that security levels do not change during the normal operation of the system

New cards
3

Principle of weak tranquility

This principle states that security levels may never change in such a way as to violate a defined security policy

(It's also desirable as it allows systems to observe the principle of least privilege)

New cards
4
<p>Digital Signatures</p>

Digital Signatures

It lets the receiver know that the data was sent by a known sender (authentication) and that the message was not altered during transit (integrity)

New cards
5

Multi-Touch Verification System

A system that authenticates users by performing multi-touch gestures on a device's screen

New cards
6

Anonymity

The state of being not identifiable within a set of subjects

(The idea of hiding the aspects of metadata)

New cards
7

Anonymity Set

The group of people that you’re indistinguishable from

New cards
8

OWASP (Open Web Application Security Project)

An organization that collects information about how popular attacks are at a given time

New cards
9

Authentication

The act of proving one's identity to another entity

New cards
10

Two Factor Authentication (2FA)

An approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are

New cards
11

Security Model

A model that defines essential aspects of security and their relationship with the OS and its performance

New cards
12

Bell-LaPadula (BLP) Security Model

A security model that provides confidentiality to a system

New cards
13

BLP's simple security property

This security property states that a subject at a given security level may not read an object at a higher security level (NO READ UP)

New cards
14

BLP's * security property

This security property states that a subject at a given security level may not write to any object at a lower security level (NO WRITE DOWN)

New cards
15

BLP's strong * security property

This security property states that a subject at a given security level may only write to objects with a matching security level

New cards
16

BLP's discretionary security property

This security property uses an access matrix to specify the discretionary access control

New cards
17

Biba Integrity Security Model

This security model describes a set of access control rules designed to ensure data integrity by grouping objects and subjects into ordered levels of integrity

New cards
18

Biba's simple integrity property

This security property states that a subject at a given level of integrity must not read data at a lower integrity level (NO READ DOWN)

New cards
19

Biba's * integrity property

This security property states that a subject at a given level of integrity must not write to data at a higher integrity level (NO WRITE-UP)

New cards
20

Biba's invocation property

This security property states that a process from below cannot request higher access, only with subjects at an equal or lower integrity level

New cards
21

Lipner's Security Model

This security model combines the elements of the BLP and Biba models to provide confidentiality and integrity to the system

New cards
22

Separation of duty

Requiring at least two different people to perform the steps if two or more steps are required to perform the duty

New cards
23

Separation of function

Isolating the assets of an organization from each other based on function

New cards
24

Auditing

Analyzing systems to determine what actions took place and who performed them

New cards
25

Clark-Wilson Integrity Security Model

This security model, based on the notion of a transaction, provides a foundation for specifying and analyzing an integrity policy for a computing system

(A well-formed transaction is a series of operations that transition a system from one consistent state to another consistent state)

New cards
26

Chinese Wall Security Model

This security model concentrates on confidentiality that helps prevent there from being conflicts of interest between different businesses and organizations

New cards
27

Operating System

The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals

New cards
28

MULTICS

A time-sharing operating system that allowed multiple Processes to use the same machine all at once

(This meant that no one could not make superficial assumptions about one Process not being able to access the memory or state of another)

New cards
29

UNIX

It's the modern successor to MULTICS and a multiuser, multitasking OS designed for flexibility and adaptability

New cards
30

Process Isolation

Making sure that two or more processes that are running on the same machine do not interfere with each other in any way, but still have ways of communicating with each other

New cards
31

Hash Value/Digest

A fixed-length code sequence outputted by a hash function

New cards
32

Hashing

A one-way process that maps variable-length data to a fixed-length hash

New cards
33

Hash Function

An algorithm that takes a piece of data as input and outputs a hash value

New cards
34

Weak-collision resistance property

Given an input X and a hashing function H(), it's very difficult to find another input Y on which H(X) == H(Y)

Hint: Hash functions have this resistance property

New cards
35

Strong-collision resistance property

Given a hashing function H() and two inputs X and Y, there exists an absolute minimum chance of H(X) == H(Y)

Hint: Hash functions have this resistance property

New cards
36

One-wayness property

Being able to compute hashes given the original data as input but not being able to restore it back to the original data by passing its hash value through the hashing function again

Hint: Hash functions have this security property

New cards
37

Collision

When different data inputs result in the same hash after being processed by a hashing function

New cards
38

Encryption

A way of translating data from plaintext (unencrypted) to ciphertext (encrypted)

New cards
39
<p>Symmetric (Private Key) Encryption</p>

Symmetric (Private Key) Encryption

A type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic data

New cards
40
<p>Asymmetric (Public Key) Encryption</p>

Asymmetric (Public Key) Encryption

A process that uses a pair of related keys (one public key and one private key) to encrypt and decrypt a message and protect it from unauthorized access or use

New cards
41

Pseudonymity

The use of pseudonyms as IDs that link all interactions with each other

New cards
42

CIA Triad

A threat model used for finding vulnerabilities and methods for creating solutions

New cards
43

Confidentiality

Ensures that there's no unauthorized disclosure of data (enforced through encryption)

New cards
44

Integrity

Ensures that there's no unauthorized modification of data (enforced through hashes)

New cards
45

Availability

Ensures that there's no unauthorized withholding of data (enforced through redundancy)

New cards
46

Virtualization

A process that allows for more efficient utilization of physical computer hardware by using software to create an abstraction layer over computer hardware that allows the hardware elements of a single computer to be divided into multiple virtual computers

(This technology drives the cloud computing economics)

New cards
47

Abstraction Layer

A generalization of a conceptual model or algorithm, away from the specific implementation / A way of hiding the working details of a subsystem

New cards
48
<p>Reference Monitor</p>

Reference Monitor

A secure, always used and fully testable module that controls all access to data objects and devices by verifying the nature of the request against a table of allowable access types and security policies for each process in the system

New cards
49

Custom Reference Monitor

Used to make decisions that's adapted to our system's security policies and adopted access control model

New cards
50

Virtual Machine (VM)

A computer resource that uses software instead of a physical computer to run programs and deploy applications

New cards
51

Virtual Guest Machine (Guest VM)

A virtual machine that is installed, executed and hosted on the local physical machine

New cards
52

Physical Host Machine

New cards
53

Hypervisor/Virtual Machine Monitor (VMM)

A software that creates and runs VMs by allowing one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing

New cards
54

Type 1 Hypervisor (Type 1 VMM)

In this type of hypervisor, VM resources are scheduled directly to the hardware by the hypervisor

(This type of hypervisor is on bare metal)

New cards
55

Type 2 Hypervisor (Type 2 VMM)

In this type of hypervisor, VM resources are scheduled against a host operating system, which is then executed against the hardware

(This type of hypervisor is hosted)

New cards
56

Security Design Principles

Principles that help make systems as free of Vulnerabilities and impervious to attacks and breaches

New cards
57

Principle of Open Design

A security design principle that states that your system shouldn't rely on the secrecy of your implementations, meaning that people should be able to comment on your code

New cards
58

Principle of Sweeping Simplification/Keep It Simple Stupid!

A security design principle that states that your system's designs and interactions should be easy and simple

New cards
59

Principle of Design for Iterations

A security design principle that states that you design your software to ensure you can change parts of it in the future, in case you need to

New cards
60

Principle of Least Astonishment

A security design principle that states that you create something that follows what the user would expect to happen in a given situation

New cards
61

Principle of Minimizing Secrets

A security design principle that states that you minimize the size, quantity and complexity of what is to be protected, and limit externally facing points of attack

New cards
62

Principle of Least Privilege

A security design principle that states that an entity should have exactly the permissions they need in order to fulfill their tasks

New cards
63

Principle of Complete Mediation

A security design principle that states that all access to objects should be checked to ensure that access is allowed

New cards
64

Principle of Least Common Mechanism

A security design principle that states that mechanisms used to access resources should not be shared

New cards
65

Principle of Fail-Safe Defaults

A security design principle that states that if some part of the system fails, it should default in a way that has the appropriate security guarantee for whatever it is you want to have happen, in order not to have your system compromised

(The idea is to "fail-close" in a way that does not compromise the system and its data rather than "fail-open", where the method of failing allows the attacker to achieve some objective)

New cards
66

Principle of Economy of Mechanisms

A security design principle that states that security mechanisms should be as simple as possible while still having the security properties that you need

New cards
67

Security Policy

A series of rules that must be followed in order to ensure the safety of an organization and its system

New cards
68

Inclusive Security Policies

These security policies specify a list of all the things that you're allowed to do and anything not mentioned is automatically disallowed

New cards
69

Exclusive Security Policies

These security policies specify a list of all the things that you're not allowed to do and anything not mentioned is automatically allowed

(This type of security policy requires you to update the policy more frequently since there's always a new technology that comes out)

New cards
70

Security Mechanism

Something that enforces a security policy, either in whole or part

New cards
71

Mechanisms based on prevention

This type of security mechanism ensures that an aspect of a security policy cannot be violated

New cards
72

Mechanisms based on detection

This type of security mechanism determines whether a security policy has been violated

New cards
73

Mechanisms based on recovery

This type of security mechanism ensures that you're able to revert back to a secure state after a security policy has been violated

New cards
74

Information Flow Control

Controlling the flow of data in order to ensure its confidentiality by monitoring the shared data

New cards
75

Data Labels

These labels indicate the permitted information flows and specified set of policies for each piece of data

New cards
76

Data Confidentiality Constraints

This type of data labelling specifies a set of policies, such as who may read a given piece of data

Label example: {Alice: Bob, Eve; Charlie: Bob, Eve} • Alice and Charlie conjointly own a given set of data • Bob and Eve are permitted to read it

New cards
77

Data Integrity Constraints

This type of data labelling specifies a set of policies, such as who may modify a given piece of data

Label Example: {Alice ? Bob} • Alice owns the given set of data • Bob is permitted to modify it

New cards
78

Password

A secret string of characters that allows access to a computer system or service

New cards
79

One-Time Password (OTP)

A password that is valid for only one login session or transaction, on a computer system or other digital device

New cards
80

Software OTP

An OTP generated by the company and sent to your mobile phone or PC

• An event-based OTP (The moving factor is triggered by an event)

New cards
81

Hardware OTP

An OTP generated by a security device/token

• A time-based OTP (The moving factor is time)

New cards
82
<p>Password Salt</p>

Password Salt

Adding a random value to a plaintext password before putting it through the hashing process

New cards
83
<p>Kerberos</p>

Kerberos

A protocol used to authenticate people on a network based on tickets

New cards
84
<p>Digital Certificates</p>

Digital Certificates

An electronic document used to prove the ownership of a Public key

New cards
85

Threat Model

This model helps you understand what can go wrong within a system and the potential vulnerabilities, threats, breaches and attacks

New cards
86

Threat Matrix

A threat modelling tool that allows us to model and subjectively categorize potential threats by applying a structured ranking process

New cards
87

Threat Tree

A threat modelling tool that can be used to calculate risk for any asset

New cards
88

Attack Tree

A threat modelling tool to visualize the security posture of a system and organize ideas about how attackers might attack

New cards
89

Access Control

A series of mechanisms to specify what users do, which resources they can access, and what operations they can perform on a system, as well as identifying users by verifying various login credentials

New cards
90

Access Control: Identification

An access control function method of establishing the subject's identity while being non-descriptive of their position or task

New cards
91

Access Control: Authentication

An access control function method of providing the claimed identity of an entity that has previously identified itself

New cards
92

Access Control: Authorization

An access control function process that determines what level of clearance and access the authenticated user has within the system and the data that they requested to log into or gain access

New cards
93

Access Control Mechanism

Takes as input security policies (What a subject is allowed to do and with what it may interact with) and attempted actions, and outputs an accept or reject response for that action

New cards
94

Access Control Form (ACF)

A method of access control used to request and change access responsibilities of entities within a system

New cards
95

Discretionary Access Control (DAC)

This method of access control is at the discretion of the owner of the resource

New cards
96

Mandatory Access Control (MAC)

This method of access control is based on a security labelling system, meaning users have security clearances and resources have security labels that contain data classifications

(This model is used in environments where information classification and confidentiality are very important)

New cards
97

Non-Discretionary Role-Based Access Control (RBAC)

This method of access control uses a centrally administered set of controls to determine how subjects and objects interact

(It is the best know access control form for an organization that has a high turnover)

New cards
98

Content Dependent Access Control (CDAC)

This method of access control makes decisions based on the type of content contained in an object

(Access control decisions are content-dependent)

New cards
99

Control Based Access Control (CBAC)

This method of access control makes decisions based on the context of a subject's request to an object

(This method of access control requires more information about the subject in order to make a decision, such as their identity, the object that they're requesting access to, etc.)

New cards
100

Access Control: Constrained User Interfaces (CUI)

A method of enforcing access control by constraining the user interface used to get access

(This can be done by not allowing certain types of access on the interface, or not including the ability to request certain types of access or objects)

New cards

Explore top notes

note Note
studied byStudied by 16 people
... ago
5.0(1)
note Note
studied byStudied by 92 people
... ago
5.0(2)
note Note
studied byStudied by 22 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 85 people
... ago
5.0(4)
note Note
studied byStudied by 36540 people
... ago
4.9(69)

Explore top flashcards

flashcards Flashcard (100)
studied byStudied by 84 people
... ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 15 people
... ago
5.0(1)
flashcards Flashcard (41)
studied byStudied by 49 people
... ago
5.0(1)
flashcards Flashcard (52)
studied byStudied by 36 people
... ago
5.0(8)
flashcards Flashcard (446)
studied byStudied by 84 people
... ago
5.0(1)
flashcards Flashcard (89)
studied byStudied by 98 people
... ago
4.0(1)
flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (63)
studied byStudied by 376 people
... ago
5.0(3)
robot