The CISSP Prep Guide
Chapter 5
Security Architecture
and Models
The CISSP®
Prep Guide: Mastering the Ten Domains of Computer Security
by Ronald L. Krutz, Russell Dean Vines (August 24, 2001),
John Wiley & Sons. ISBN: 0471413569
Topics in Chapter 5
• Computer Organization
• Hardware Components
• Software/Firmware Components
• Open Systems
• Distributed Systems
• Protection Mechanism
• Evaluation Criteria
Topics in Chapter 5
• Certification and Accreditation
• Formal Security Models
• Confidentiality Models
• Integrity Models
• Information Flow Models
Computer Architecture
• CPU – ALU and Control Unit
• Memory
– Cache, RAM, PLD, ROM, Real/Primary and
Secondary memory, Sequential and Random
Access Memory, Virtual Memory
– Addressing: Register, Direct, Absolute,
Implied, Indirect Addressing
– Memory Protection
Instruction Execution Cycle
• Privileged Instructions
• Pipelining
• CISC versus RISC
• Multiprogramming
• Multitasking
• Multiprocessing
Input/Output Structures
• Instruction Fetch-Decode-Execute Cycle
• Direct Memory Access
• Interruption
Software
• 1GL - Machine language
• 2GL - Assembly language
• 3GL - High Level Programming language
• 4GL - NATURAL, FOCUS, SQL
• 5GL – Natural Language
Distributed Architecture
• Client-Server Model
• Security Concerns
– Email
– Telnet, FTP
– Encryption
Distributed Architecture
Security Concerns
• Desktop Systems may be at risk of being
exposed, and as entry for critical
information
• Users may lack security awareness
• Modem and dial-up access to corporate
network
• Download or Upload of critical information
• Lack of proper backup or disaster recovery
For Protection Mechanisms
• Email and download/upload policies
• Robust access control and biometrics
• Graphical user interface mechanism
• File encryption
• Separation of privileged process and others
• Protection domain, disks, systems, laptops
• Labeling and classification
For Protection Mechanisms
• Centralized backup for desktop systems
• Security awareness and regular training
• Control of software on desktop systems
• Encryption
• Logging of transaction and transmission
• Appropriate access controls
• Protection of applications and database
For Protection Mechanisms
• Security Formal methods in Software
Development, Change Control,
Configuration Management, and
Environmental Change
• Disaster Recovery and Business Continuity
Planning, for all systems including desktop,
file system and storages, database and
applications, data and information
Protected Mechanisms
• Trusted Computing Base (TCB)
• Security Perimeter
• Trusted Path
• Trusted Computer System
• Abstraction, Encapsulation, and
Information Hiding
Rings
• Protection Rings
• Security Kernel
• Reference Model
• MULTICS
Security Modes
• Dedicated
• Compartmented
• Controlled
• Limited Access
Additional Considerations
• Covert Channel
• Lack of Parameter Checking
• Maintenance Hook and Trapdoor
• Time of Check to Time of Use (TOC/TOU)
Attack
Assurance
• Evaluation Criteria
– TCSEC by NCSC
Trusted Computer System Evaluation Criteria
– Classes of Security
• D – Minimal protection
• C – Discretionary protection (C1 and C2)
• B – Mandatory protection (B1, B2, B3)
• A – Verified protection; formal methods (A1)
– ITSEC
Certification and Accreditation
• Certification
– The comprehensive evaluation of the technical
and non-technical security features of an
information system and the other safeguards,
which are created in support of the
accreditation process, to establish the extent in
which a particular design and implementation
meets the set of specified security
Certification and Accreditation
• Accreditation
– A formal declaration by a Designated
Approving Authority (DAA) where an
information system is approved to operate in a
particular security mode using a prescribed set
of safeguards at an acceptable level of risk
Certification and Accreditation
• DITSCAP
– Defense Information Technology Security
Certification and Accreditation Process
– Phase 1 Definition
– Phase 2 Verification
– Phase 3 Validation
– Phase 4 Post Accreditation
• NIACAP
– National Information Technology Security
Certification and Accreditation Process
– Site Accreditation
– Type Accreditation for Application or System
– System Accreditation for major application or
general support system
Information Security Models
• Access Control Models
– The Access Matrix
– Take-Grant Model
– Bell-LaPadula Model
• Integrity Models
– The Biba Integrity Model
– The Clark-Wilson Integrity Model
• Information Flow Models
– Non-interference Model
– Composition Theories
Bell-LaPadula Model
• DoD, Multilevel security policy
– Individual’s Need-to-Know Basis
– Security-labeled Materials and
– Clearance of Confidential, Secret, or Top Secret
– Thus dealing only with confidentiality of
classified material, but not with integrity or
availability
– Input, State, Function and State Transition
Bell-LaPadula Model
1. The Simple Security Property
(ss Property).
States that reading of information by a
subject at a lower sensitivity level from an
object at a higher level is not permitted
(No Read Up)
Bell-LaPadula Model
2. The * (star) Security Property
States that writing of information by a
subject at a higher level of sensitive to an
object at a lower level of sensitivity is not
permitted.
(No Write Down)
Bell-LaPadula Model
3. The Discretionary Security Property
Uses an access matrix to specify
discretionary access control
But Write-Up, Read-Down are OK.
• Authorization
• Control
– Content-Dependent, Context-Dependent
Integrity Model
• Goals
1. The data is protected from modification by
unauthorized users
2. The data is protected from unauthorized
modification by authorized users
3. The data is internally and externally
consistent – the data held in a database must
balance internally and must correspond to the
external, real-world situation.
Biba Integrity Model
• In 1977, lattice-based model
• Using “less than” or “equal to” relationship
• least upper bound (LUB) and greatest lower
bound (GLB)
• The Lattice as a set of integrity classes (IC)
and an ordered relationship among classes
• A Lattice as (IC, <=, LUB, GUB)
Biba Integrity Model
1. The Simple Integrity Axiom
States that a subject at one level of
integrity is not permitted to observe (read)
an object of a lower integrity
No Read Down
Biba Integrity Model
2. The * (Star) Integrity Axiom,
States that an object at one level of
integrity is not permitted to modify (write
to) an object of a higher level of integrity.
No Write Up
Biba Integrity Model
3. A subject at one level of integrity cannot
invoke a subject at a higher level of
integrity
Clark-Wilson Integrity Model
• Clark-Wilson, 1987
• Constrained Data Item (CDI)
– A Data item whose integrity is to be preserved
• Integrity Verification Procedure (IVP)
– Confirms that all CDIs through a well-formed
transaction, which transforms a CDI from one valid
integrity state to another valid integrity state
• Unconstrained Data Item (UDI)
– Data items outside of the control area of the modeled
environment such as input information

More Related Content

PDF
6. Security Assessment and Testing
PDF
CISSP Prep: Ch 3. Asset Security
PDF
2. Asset Security
PDF
3. Security Engineering
PPT
Security models
PDF
3. Security Engineering
PPTX
Security Architecture-Security Models
PDF
CNIT 125 Ch 3. Asset Security
6. Security Assessment and Testing
CISSP Prep: Ch 3. Asset Security
2. Asset Security
3. Security Engineering
Security models
3. Security Engineering
Security Architecture-Security Models
CNIT 125 Ch 3. Asset Security

What's hot (20)

ODP
CISSP Week 22
PDF
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
PDF
7. Security Operations
PPTX
CISSP - Chapter 3 - Physical security
PDF
CISSP Prep: Ch 4. Security Engineering (Part 1)
PPSX
8 Access Control
PDF
CISSP Prep: Ch 4. Security Engineering (Part 2)
PDF
Bell-La Padula Healthcare
PPSX
5 Cryptography Part2
PPT
3. security architecture and models
PDF
CNIT 125 Ch 4. Security Engineering (Part 1)
PPTX
Cause 11 im final
PDF
CNIT 160 4d Security Program Management (Part 4)
PDF
1. Security and Risk Management
PDF
CNIT 125 Ch 8. Security Operations
PPT
Ch1 cse
PPT
Isys20261 lecture 01
PDF
CNIT 160 4e Security Program Management (Part 5)
PPTX
501 ch 9 implementing controls
PDF
CNIT 160: 3. Information Risk Management (Part 4)
CISSP Week 22
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
7. Security Operations
CISSP - Chapter 3 - Physical security
CISSP Prep: Ch 4. Security Engineering (Part 1)
8 Access Control
CISSP Prep: Ch 4. Security Engineering (Part 2)
Bell-La Padula Healthcare
5 Cryptography Part2
3. security architecture and models
CNIT 125 Ch 4. Security Engineering (Part 1)
Cause 11 im final
CNIT 160 4d Security Program Management (Part 4)
1. Security and Risk Management
CNIT 125 Ch 8. Security Operations
Ch1 cse
Isys20261 lecture 01
CNIT 160 4e Security Program Management (Part 5)
501 ch 9 implementing controls
CNIT 160: 3. Information Risk Management (Part 4)
Ad

Similar to Cissp chapter-05ppt178 (20)

PPTX
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
PDF
3. Security Engineering
PDF
Slide Deck CISSP Class Session 4
PDF
3. Security Engineering
PDF
CNIT 125: Ch 4. Security Engineering (Part 1)
PPTX
Security and Risk Management Practices.pptx
PPTX
Cybersecurity in Systems Analysis and Design.pptx
PDF
Využijte svou Oracle databázi na maximum!
PPTX
IEC62443.pptx
PPTX
Information Security
PPTX
ISBB_Chapter6.pptx
PDF
Software Defined Networking in the ATMOSPHERE project
PDF
Data security and Integrity
PDF
3 Reasons Why the Cloud is More Secure than Your Server
PPT
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
PPTX
Protecting Your IP with Perforce Helix and Interset
PPSX
Secure and Privacy-Preserving Big-Data Processing
PPTX
security in is.pptx
PDF
Introduction to Cybersecurity.pdf
PPTX
UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUD
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
3. Security Engineering
Slide Deck CISSP Class Session 4
3. Security Engineering
CNIT 125: Ch 4. Security Engineering (Part 1)
Security and Risk Management Practices.pptx
Cybersecurity in Systems Analysis and Design.pptx
Využijte svou Oracle databázi na maximum!
IEC62443.pptx
Information Security
ISBB_Chapter6.pptx
Software Defined Networking in the ATMOSPHERE project
Data security and Integrity
3 Reasons Why the Cloud is More Secure than Your Server
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Protecting Your IP with Perforce Helix and Interset
Secure and Privacy-Preserving Big-Data Processing
security in is.pptx
Introduction to Cybersecurity.pdf
UNIT IV RESOURCE MANAGEMENT AND SECURITY IN CLOUD
Ad

More from wardell henley (20)

PDF
RP_Patch_Management_S508C.pdf
PDF
mita_overview.pdf
PDF
Landscape_Medicaid_Healthcare_Information_Technology.pdf
PDF
Facets Overview and Navigation User Guide.pdf
PDF
self_inspect_handbook_nisp.pdf
PDF
Itil a guide to cab meetings pdf
PDF
Mn bfdsprivacy
PDF
9 150928065812-lva1-app6892 gmp
PDF
It security cert_508
PDF
15466 mba technology_white_paper
PDF
Best practices for_implementing_security_awareness_training
PDF
213946 dmarc-architecture-identifier-alignmen
PPT
Soa security2
PDF
Enterprise%20 security%20architecture%20 %20business%20driven%20security
PPT
3 securityarchitectureandmodels-120331064706-phpapp01
PDF
Splunk 7.2.3-security-hardeningstandards
PDF
Ms app 1.5.1-msinfra-bestpracticesguide
PDF
IBM enterprise Content Management
PDF
oracle EBS
PDF
5 principles-securing-devops-veracode-whitepaper
RP_Patch_Management_S508C.pdf
mita_overview.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdf
Facets Overview and Navigation User Guide.pdf
self_inspect_handbook_nisp.pdf
Itil a guide to cab meetings pdf
Mn bfdsprivacy
9 150928065812-lva1-app6892 gmp
It security cert_508
15466 mba technology_white_paper
Best practices for_implementing_security_awareness_training
213946 dmarc-architecture-identifier-alignmen
Soa security2
Enterprise%20 security%20architecture%20 %20business%20driven%20security
3 securityarchitectureandmodels-120331064706-phpapp01
Splunk 7.2.3-security-hardeningstandards
Ms app 1.5.1-msinfra-bestpracticesguide
IBM enterprise Content Management
oracle EBS
5 principles-securing-devops-veracode-whitepaper

Recently uploaded (20)

PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Configure Apache Mutual Authentication
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Five Habits of High-Impact Board Members
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
The various Industrial Revolutions .pptx
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPT
Geologic Time for studying geology for geologist
Flame analysis and combustion estimation using large language and vision assi...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Configure Apache Mutual Authentication
Consumable AI The What, Why & How for Small Teams.pdf
Build Your First AI Agent with UiPath.pptx
OpenACC and Open Hackathons Monthly Highlights July 2025
Developing a website for English-speaking practice to English as a foreign la...
Five Habits of High-Impact Board Members
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Chapter 5: Probability Theory and Statistics
A contest of sentiment analysis: k-nearest neighbor versus neural network
Final SEM Unit 1 for mit wpu at pune .pptx
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Convolutional neural network based encoder-decoder for efficient real-time ob...
The various Industrial Revolutions .pptx
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Microsoft Excel 365/2024 Beginner's training
A review of recent deep learning applications in wood surface defect identifi...
Geologic Time for studying geology for geologist

Cissp chapter-05ppt178

  • 1. The CISSP Prep Guide Chapter 5 Security Architecture and Models The CISSP® Prep Guide: Mastering the Ten Domains of Computer Security by Ronald L. Krutz, Russell Dean Vines (August 24, 2001), John Wiley & Sons. ISBN: 0471413569
  • 2. Topics in Chapter 5 • Computer Organization • Hardware Components • Software/Firmware Components • Open Systems • Distributed Systems • Protection Mechanism • Evaluation Criteria
  • 3. Topics in Chapter 5 • Certification and Accreditation • Formal Security Models • Confidentiality Models • Integrity Models • Information Flow Models
  • 4. Computer Architecture • CPU – ALU and Control Unit • Memory – Cache, RAM, PLD, ROM, Real/Primary and Secondary memory, Sequential and Random Access Memory, Virtual Memory – Addressing: Register, Direct, Absolute, Implied, Indirect Addressing – Memory Protection
  • 5. Instruction Execution Cycle • Privileged Instructions • Pipelining • CISC versus RISC • Multiprogramming • Multitasking • Multiprocessing
  • 6. Input/Output Structures • Instruction Fetch-Decode-Execute Cycle • Direct Memory Access • Interruption
  • 7. Software • 1GL - Machine language • 2GL - Assembly language • 3GL - High Level Programming language • 4GL - NATURAL, FOCUS, SQL • 5GL – Natural Language
  • 8. Distributed Architecture • Client-Server Model • Security Concerns – Email – Telnet, FTP – Encryption
  • 9. Distributed Architecture Security Concerns • Desktop Systems may be at risk of being exposed, and as entry for critical information • Users may lack security awareness • Modem and dial-up access to corporate network • Download or Upload of critical information • Lack of proper backup or disaster recovery
  • 10. For Protection Mechanisms • Email and download/upload policies • Robust access control and biometrics • Graphical user interface mechanism • File encryption • Separation of privileged process and others • Protection domain, disks, systems, laptops • Labeling and classification
  • 11. For Protection Mechanisms • Centralized backup for desktop systems • Security awareness and regular training • Control of software on desktop systems • Encryption • Logging of transaction and transmission • Appropriate access controls • Protection of applications and database
  • 12. For Protection Mechanisms • Security Formal methods in Software Development, Change Control, Configuration Management, and Environmental Change • Disaster Recovery and Business Continuity Planning, for all systems including desktop, file system and storages, database and applications, data and information
  • 13. Protected Mechanisms • Trusted Computing Base (TCB) • Security Perimeter • Trusted Path • Trusted Computer System • Abstraction, Encapsulation, and Information Hiding
  • 14. Rings • Protection Rings • Security Kernel • Reference Model • MULTICS
  • 15. Security Modes • Dedicated • Compartmented • Controlled • Limited Access
  • 16. Additional Considerations • Covert Channel • Lack of Parameter Checking • Maintenance Hook and Trapdoor • Time of Check to Time of Use (TOC/TOU) Attack
  • 17. Assurance • Evaluation Criteria – TCSEC by NCSC Trusted Computer System Evaluation Criteria – Classes of Security • D – Minimal protection • C – Discretionary protection (C1 and C2) • B – Mandatory protection (B1, B2, B3) • A – Verified protection; formal methods (A1) – ITSEC
  • 18. Certification and Accreditation • Certification – The comprehensive evaluation of the technical and non-technical security features of an information system and the other safeguards, which are created in support of the accreditation process, to establish the extent in which a particular design and implementation meets the set of specified security
  • 19. Certification and Accreditation • Accreditation – A formal declaration by a Designated Approving Authority (DAA) where an information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk
  • 20. Certification and Accreditation • DITSCAP – Defense Information Technology Security Certification and Accreditation Process – Phase 1 Definition – Phase 2 Verification – Phase 3 Validation – Phase 4 Post Accreditation
  • 21. • NIACAP – National Information Technology Security Certification and Accreditation Process – Site Accreditation – Type Accreditation for Application or System – System Accreditation for major application or general support system
  • 22. Information Security Models • Access Control Models – The Access Matrix – Take-Grant Model – Bell-LaPadula Model • Integrity Models – The Biba Integrity Model – The Clark-Wilson Integrity Model • Information Flow Models – Non-interference Model – Composition Theories
  • 23. Bell-LaPadula Model • DoD, Multilevel security policy – Individual’s Need-to-Know Basis – Security-labeled Materials and – Clearance of Confidential, Secret, or Top Secret – Thus dealing only with confidentiality of classified material, but not with integrity or availability – Input, State, Function and State Transition
  • 24. Bell-LaPadula Model 1. The Simple Security Property (ss Property). States that reading of information by a subject at a lower sensitivity level from an object at a higher level is not permitted (No Read Up)
  • 25. Bell-LaPadula Model 2. The * (star) Security Property States that writing of information by a subject at a higher level of sensitive to an object at a lower level of sensitivity is not permitted. (No Write Down)
  • 26. Bell-LaPadula Model 3. The Discretionary Security Property Uses an access matrix to specify discretionary access control But Write-Up, Read-Down are OK. • Authorization • Control – Content-Dependent, Context-Dependent
  • 27. Integrity Model • Goals 1. The data is protected from modification by unauthorized users 2. The data is protected from unauthorized modification by authorized users 3. The data is internally and externally consistent – the data held in a database must balance internally and must correspond to the external, real-world situation.
  • 28. Biba Integrity Model • In 1977, lattice-based model • Using “less than” or “equal to” relationship • least upper bound (LUB) and greatest lower bound (GLB) • The Lattice as a set of integrity classes (IC) and an ordered relationship among classes • A Lattice as (IC, <=, LUB, GUB)
  • 29. Biba Integrity Model 1. The Simple Integrity Axiom States that a subject at one level of integrity is not permitted to observe (read) an object of a lower integrity No Read Down
  • 30. Biba Integrity Model 2. The * (Star) Integrity Axiom, States that an object at one level of integrity is not permitted to modify (write to) an object of a higher level of integrity. No Write Up
  • 31. Biba Integrity Model 3. A subject at one level of integrity cannot invoke a subject at a higher level of integrity
  • 32. Clark-Wilson Integrity Model • Clark-Wilson, 1987 • Constrained Data Item (CDI) – A Data item whose integrity is to be preserved • Integrity Verification Procedure (IVP) – Confirms that all CDIs through a well-formed transaction, which transforms a CDI from one valid integrity state to another valid integrity state • Unconstrained Data Item (UDI) – Data items outside of the control area of the modeled environment such as input information