Page 482 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 482

Chapter 8

               Principles of Security Models, Design, and

               Capabilities


               THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER

               INCLUDE:

                      Domain 3: Security Architecture and Engineering

                        3.1 Implement and manage engineering processes using secure
                        design principles

                        3.2 Understand the fundamental concepts of security models

                        3.3 Select controls based upon systems security requirements

                        3.4 Understand security capabilities of information systems














                                       Understanding the philosophy behind security
               solutions helps to limit your search for the best controls for specific
               security needs. In this chapter, we discuss security models, including
               state machine, Bell-LaPadula, Biba, Clark-Wilson, Take-Grant, and
               Brewer and Nash. This chapter also describes Common Criteria and

               other methods governments and corporations use to evaluate
               information systems from a security perspective, with particular
               emphasis on U.S. Department of Defense and international security
               evaluation criteria. Finally, we discuss commonly encountered design
               flaws and other issues that can make information systems susceptible
               to attack.

               The process of determining how secure a system is can be difficult and

               time-consuming. In this chapter, we describe the process of evaluating
               a computer system’s level of security. We begin by introducing and
   477   478   479   480   481   482   483   484   485   486   487