Page 1584 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1584

Chapter 8: Principles of Security Models,

               Design, and Capabilities


                1.  Security models include state machine, information flow,
                    noninterference, Take-Grant, access control matrix, Bell-LaPadula,

                    Biba, Clark-Wilson, Brewer and Nash (aka Chinese Wall), Goguen-
                    Meseguer, Sutherland, and Graham-Denning.

                2.  The primary components of the trusted computing base (TCB) are
                    the hardware and software elements used to enforce the security
                    policy (these elements are called the TCB), the security perimeter
                    distinguishing and separating TCB components from non-TCB
                    components, and the reference monitor that serves as an access

                    control device across the security perimeter.

                3.  The two primary rules of Bell-LaPadula are the simple rule of no
                    read-up and the star rule of no write-down. The two rules of Biba
                    are the simple rule of no read-down and the star rule of no write-
                    up.

                4.  An open system is one with published APIs that allow third parties
                    to develop products to interact with it. A closed system is one that
                    is proprietary with no third-party product support. Open source is

                    a coding stance that allows others to view the source code of a
                    program. Closed source is an opposing coding stance that keeps
                    source code confidential.
   1579   1580   1581   1582   1583   1584   1585   1586   1587   1588   1589