Unit 2 Information Management and Risk Management
Unit 2 Information Management and Risk Management
4. Boundaries: The TCB has defined boundaries that separate it from the
rest of the system. It helps identify which components are considered
part of the trusted base and which components are external and
potentially untrusted. The boundaries help minimize the potential attack
surface and reduce the risk of unauthorized access or manipulation.
5. Isolation: The TCB components are often isolated and separated from
other parts of the system to prevent unauthorized interference or
tampering. This isolation ensures that the TCB remains secure even if
other parts of the system are compromised.
IS UNIT-2 (Yash Mule)
3. Ring 0, the innermost ring, represents the most trusted and privileged
level. It often corresponds to the kernel mode in operating systems.
4. Rings 1, 2, and 3, the outer rings, have progressively less trust and
privilege. They typically correspond to user mode in operating systems.
7. This isolation helps contain potential security breaches and limits the
impact of compromised components.
3. Secure Boot: Ensures the system starts up using only trusted and
authorized firmware and software components, preventing unauthorized
modifications during boot-up.
7. Least Privilege: Least privilege principle grants users and systems only the
minimum privileges necessary to perform their authorized tasks. This limits the
potential damage caused by compromised accounts or software vulnerabilities.
4. Evaluation Process:
- ITSEC outlines a structured evaluation process involving documentation
review, testing, vulnerability analysis, and audits.
- Independent evaluators perform the evaluation based on the defined
criteria and provide certification or assurance levels for the system.
IS UNIT-2 (Yash Mule)
6. Conformance:
- ITSEC evaluates the conformance of a system to the defined security
functional and assurance requirements.
- Conformance indicates how well the system meets the specified criteria and
provides the claimed security features.
Confidentiality Models:
1. Bell-LaPadula Model (BLP):
- Focuses on keeping information confidential.
- Users can only access information at or below their security level (no read
up).
- Prevents unauthorized disclosure of information.
IS UNIT-2 (Yash Mule)
2. Biba Model:
- Emphasizes maintaining the integrity of information.
- Users can only modify information at or below their security level (no write
up).
- Prevents unauthorized modification of information.
3. Clark-Wilson Model:
- Focuses on data integrity and consistency.
- Defines well-formed transaction rules and separation of duties.
- Ensures data is modified through controlled operations to maintain integrity.
Integrity Models:
1. Brewer-Nash Model (CAP Theorem):
- Considers the trade-off between consistency, availability, and partition
tolerance in distributed systems.
- It is impossible to achieve strong consistency, high availability, and partition
tolerance simultaneously.
2. Brewer's "CAP Theorem" Extended (PACELC):
- Extends the CAP Theorem to include factors like latency and consistency
models.
- Considers the choice between availability and consistency during network
partitions.
3. Non-Interference Model:
- Focuses on preventing information leakage between different security
levels.
- Actions at higher security levels should not affect lower security levels.