Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Monzones

Trusted Computing Base The Trusted Computer System Evaluation Criteria (TCSEC)
is an older DoD standard that defines the criteria for assessing the access controls
in a computer system.
Bell-LaPadula Confidentiality Model The Bell-LaPadula (BLP) model ensures
confidentiality by controlling access based on security clearances and data
classification, preventing information flow from higher to lower security levels.
The Biba model focuses on integrity, allowing read access only to objects with
lower or equal integrity levels and write access to objects with equal or higher
integrity levels, preventing contamination of higher integrity data.

Clark-Wilson Integrity Model The Clark-Wilson integrity model, which is built


upon principles of change control rather than integrity levels, was designed for
the commercial environment. The model’s change control principles are
● No changes by unauthorized subjects
● No unauthorized changes by authorized subjects
● The maintenance of internal and external consistency
The Graham-Denning access control model is a comprehensive framework that
manages access to resources through objects, subjects, and rights. Subjects
consist of processes and domains, while domains impose constraints on subject
access. The model defines a set of eight fundamental protection rights, similar to
those in modern operating systems, which control subject-object interactions and
play a vital role in access control.
The eight primitive protection rights are:
1. Create object
2. Create subject
3. Delete object
4. Delete subject
5. Read access right
6. Grant access right
7. Delete access right
8. Transfer access right
Harrison-Ruzzo-Ullman Model The Harrison-Ruzzo-Ullman (HRU) model defines a
method to allow changes to access rights and the addition and removal of
subjects and objects, a process that the Bell-LaPadula model does not allow.
● Create subject/create object
● Enter right X into
● Delete right X from
● Destroy subject/destroy object

Brewer-Nash Model (Chinese Wall) The Brewer-Nash model, also referred to as


the Chinese Wall, is a mechanism aimed at avoiding conflicts of interest between
different parties. In a scenario where a law firm represents both parties involved
in a car accident lawsuit, the Brewer-Nash model ensures that individual attorneys
cannot access the private information of the litigants. This is achieved by requiring
users to choose one of two conflicting sets of data, thereby preventing access to
the conflicting information once a selection is made.
Firewalls
Firewalls are physical barriers in construction and vehicles, while in information
security, they control data flow between networks. They add security by
preventing fire spread, separating hazardous parts, and restricting information
movement. Firewalls vary in form, including concrete walls, metal partitions, or
software services.
Firewalls fall into five major categories of processing modes:
1. packet-filtering firewalls
2. application gateways
3. circuit gateways
4. MAC layer firewalls
5. Hybrids
The restrictions most commonly implemented in packet-filtering firewalls are
based on a combination of the following:
● IP source and destination address
● Direction (inbound or outbound)
● Protocol, for firewalls capable of examining the IP protocol layer
● Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) source
and destination port requests, for firewalls capable of examining the TCP/UPD
layer

You might also like