DOC PREVIEW
U of I CS 498 - Information Assurance

This preview shows page 1-2 out of 6 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Fall 2005 - Information Assurance: Exam 1 answer keyFall 2005 - Information Assurance: Exam 1 answer key92 points total1. For each of the items below, is it describing a mechanism or a policy? If it is a policy, describe a possible enforcing mechanism. If it is a mechanism, identify a policy it might be enforcing. (2 pts each, 14 total)a) Employees should be promoted on the basis of the quality of their work in the past year.This is policy. A mechanism might be procedures to track employee’s goals and achievements on a regular basis and use this information in the promotion decision.b) Default access for new files set to owner read, write, execute; group read; and no access for other.This is mechanism. It might be enforcing the policy that default file access should be constrained to the owner and group.c) The border firewall drops incoming traffic to the standard HTTP port.This is mechanism. A possible policy is that company web servers should not be accessible from outside the corporate network.d) Incoming students must sign form that confirms they have read the campus acceptable use policy.This is mechanism. It might be enforcing the policy that all students must be aware of the acceptable use policy.e) All employees will ensure that their work computers are secured.This is policy. An enforcing mechanism might be that IT staff periodically scan the employee machines to detect unsecured machines, and notify the employee to take action.f) Employees must maintain an annual trail of work goals for the coming year and reflection on success of previous year’s goals.This is mechanism. It might be enforcing a policy that employees are promoted on merit.g) Students can use campus networks for personal email as long as there are sufficient resources for educational purposes.Information AssuranceExam 1 Page 1 9/15/2006This is policy. A mechanism might be a tool that drops SMTP traffic when network usage levels reach 80%.2. Identify the following policies as Discretionary or Mandatory. (1 point each, 5 total)a) Every 10th person in the security line must under go more extensive examination.Mandatory.b) Cars with a single burned out tail light should be pulled over if they are acting otherwise suspicious and you are not otherwise engaged.Discretionary. Policeman gets to use his discretion.c) Resource owners should determine who has access to their resources.Discretionary.d) Managers have access to the emails of all direct reports.Mandatorye) Employees can enable family members to access information about company-provided insurance on their behalf.Discretionary3. Consider the following scenario. Alice has read and write access to file X and write access to file Y. Bob had read access to file Y and read, write, and execute access to file Z. Carol has read access to files X, Y, and Z.a) Write the Access Control Matrix for this scenario (5 points)X Y Z Alice Bob CarolAlice RW WBob R RWXCarol R R RInformation AssuranceExam 1 Page 2 9/15/2006b) Consider the following command:test_cmd(p,q,s) if read in A[p,s] and execute in A[p,s] then enter write in A[q,s]With the initial matrix from step a), what is the least number of times this command can be applied before it reaches a state where it will no longer change (i.e., a fixed state). Write the resulting access control matrix. (5 points)The command can be invoked two times to reach the following state. Test_cmd(Bob, Alice, Z); Test_cmd(Bob, Carol, Z);X Y Z Alice Bob CarolAlice RW W WBob R RWXCarol R R RW4. Compare the following labels both as sensitivity labels in the Bell-LaPadula confidentiality model and as integrity labels in the Strict Biba model. For each pair of subject and object labels and each model determine which access is granted of read, write, and append (pure write, no read implied). For the levels: Supreme > Good > Maybe > Unknown. (2 points each, 12 total)a) Subject=Supreme:{A,B,C} Object=UnknownBLP: R Biba: Ab) Subject=Good:{A,C}Object=Good:{B,D}BLP:none Biba:nonec) Subject Good:{C}Object=Good{A,C}BLP:A Biba:Rd) Subject=Supreme:{A}Object=Maybe:{A,B,C}BLP:none Biba:noneInformation AssuranceExam 1 Page 3 9/15/2006e) Subject=Maybe:{A}Object=Maybe:{A}BLP:RWA Biba:RWAf) Subject=Maybe:{A,B}Object=Good:{A}BLP:none Biba:none5. What are the three entities in the allowed relationship of the Clark-Wilson model? Briefly describe the relationships between these entities. The enforcement of this relationship was approximated in the Unix system described in class. (5 points total)Three entities in allowed are:• user• transaction procedure• certified data itemOne user, one transaction procedure, and a set of CDI are associated. The user is allowed to invoke the TP on any of the CDI in the set.6. Describe how the allowed relationship of the Clark-Wilson model helps to enforce two of the five system integrity requirements identified by Lipner. These requirements are listed below for your reference. (6 points total)1. Users will not write their own programs, but will use existing production programs and databases.2. Programmers will develop and test programs on a non-production system; if they need access to actual data, they will be given production data via a special process, but will use it on their development system.3. A special process must be followed to install a program from the development system onto the production system.4. The special process in requirement 3 must be controlled and audited.5. The managers and auditors must have access to both the system state and the system logs that are generated.Allowed enforces 1 because it ensures that users run only TP’s (programs) that someone has set up an allowed relationship for. The normal user cannot set the allowed relation for himself.Allowed enforces 3 because the installation process must set up the allowed relationships. Since allowed relationships must be set up by administrative users, this will require a special process.Information AssuranceExam 1 Page 4 9/15/20067. When new objects are created in a trusted operating system, it is not immediately clear what the label of the new object should be. Consider the creation of a new file in a MAC file system that follows the Bell-LaPadula model. It could inherit the sensitivity label of the creating process, the enclosing directory, or some combination of the two. Describe two scenarios: one where inheriting the process label makes sense and one where inheriting the directory label might


View Full Document

U of I CS 498 - Information Assurance

Documents in this Course
Lecture 5

Lecture 5

13 pages

LECTURE

LECTURE

39 pages

Assurance

Assurance

44 pages

LECTURE

LECTURE

36 pages

Pthreads

Pthreads

29 pages

Load more
Download Information Assurance
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Information Assurance and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Information Assurance 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?