355 Resource Security

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

authorization

bad resource calls dont happen

2
New cards

availability

good resource calls do happen

3
New cards

resource constraints

security properties in an OS or computer system

4
New cards

resource

whatever we compete for

one way function

easy to use, hard to come by

object used in computation or social interaction

5
New cards

resource examples

territory, food, CPU, printer, energy

6
New cards

asset

resource that can be secured: resources + security

7
New cards

subjects S, objects O

what a computer system consists of

8
New cards

privately owned assets

requires authorization i.e: home, account

9
New cards

publicly shared assets

require availability i.e: printer, path, internet

10
New cards

resource usage in systems

based on complex combinations of owning and sharing

11
New cards

economy ⊆ security

an asset is only an asset if it can be secured

12
New cards

security ⊆ economy

an asset is only an asset if it is cost effective

13
New cards

privately owned resources

can be traded, jointly owned, partially shared

14
New cards

permission matrix

given sets:

S of subjects

O of objects

A of actions/accesses

at state q is an assignment S × O Mq→ ℘A

of pairs <u,i> in S x O 

to the sets of actions Mq ui subset of A

which the subject u is permitted to execute on object i.

15
New cards

access matrix

For the given sets

S of subjects

O of objects

A of actions

an access matrix at a state q is an assignment

S × O Bq→ ℘A

of the pairs 〈u, i〉 ∈ S × O to

to the sets (possibly empty) of actions Bq ui ⊆ A

which the subject u attempts to execute on the object i

16
New cards

preventing accesses in Bq ui that are not permitted in Mq ui

access control is enforced by this

17
New cards

security model

consists of the following data for each

state q ∈ Q

◮ a permission matrix Mq : S × O → ℘A

◮ an access matrix Bq : S × O → ℘A

◮ a clearance map cℓq : S → L

◮ a location map pℓq : S ∪ O → L

18
New cards

secure state

conditions: authorization, clearance, no-read-up, no-write-down are satisfied for all subjects u in S and objects i in O

19
New cards

no-read-up

only a subject cleared to enter the vault can “read” an object from there

20
New cards

no-write-down

cannot give (“write”) the object out of the vault while in the vault

21
New cards

no-write-down

only a subject outside the vault can give (write)

22
New cards

security models vs secure states

a system that has a security model may be insecure

there are models where formally secure states permit obvious attacks

23
New cards

declassification

security operation, should not be prevented but controlled

24
New cards

discretionary access control

authorizations can be delegated

25
New cards

mandatory access control

where authorizations are centrally managed

26
New cards

liveness

performs the functions of life, a security requirement

27
New cards

safety

protect from natural hazards, a security requirementse

28
New cards

security

prevent from intentional attacks, a safety requirement

29
New cards

data

things we know

can copy and giveaway

30
New cards

things

what we have, can giveaway, cant copy

31
New cards

traits

what we are, cant copy or giveaway

32
New cards

protocol

assigns roles to actors

honesty, trust, privacy

33
New cards

security vs privacy

security is REQUIRED

privacy is a RIGHT

34
New cards

resource security system

authorization: bad resource calls dont happen

availabilty: good calls do happen

35
New cards

information security system

secrecy: bad info flows dont happen

authenticity: good info flows do happen

36
New cards

social choice and market economy systems

neutrality: bad data aggregations dont happen

fairness: good aggs. do happen