DOC PREVIEW
U of I CS 498 - University of Illinois at Urbana Champaign Department of Computer Science

This preview shows page 1-2 out of 7 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

NetID: KeyUniversity of Illinois at Urbana-ChampaignDepartment of Computer ScienceMidterm 1 - KeyCS498SH – Information AssuranceFall 2006Wednesday, Sept. 20, 2006Multiple choice (2 points each, 14 total)1. Which component is not a basic component of security as identified by our text.a) Availablityb) Confidentialityc) Cryptographyd) Integrity2. What is the name of the principle that says “A subject may not give rights it does not possess to another”a) Principle of Delegationb) Principle of Ownershipc) Principle of Safetyd) Principle of Attenuation of Privilege 3. Which of the following mechanisms is best described as a mandatory policy?a) The inspector should identify suspicious looking people for more extensive examination.b) Every 10th person in the security line must under go more extensive examination.c) Cars with a single burned out tail light should be pulled over if they are acting otherwise suspicious and you are not otherwise engaged.d) Facebook.com members can select who can access their personal news feed.4. Which of the following integrity models uses transactions as the basic operation.a) Clark-Wilsonb) Lipner's Integrity Matrixc) Biba's Strict Modeld) Biba's Ring Model5. What does law enforcement need to do to legally gain permission for a full content wiretap?a) Prove probable cause to the court.b) Simple request to the courtc) Prove probable cause to the FISA court if the subject is not a citizen.Information AssuranceExam 1 Page 1 9/20/2006NetID: Key6. In which scenario below is monitoring computer communication or data illegal without court supervision.a) Subject has gained unauthorized access to computer you own.b) You are a service provider, and you need to examine a client's email queue.c) You are playing with a wireless sniffer and testing it out by looking at traffic in the local coffee shop.d) You need to examine an employee's computer, and your company has a policy that makes it clear that content of work computers will be subject to periodic review.7. Which of the following laws directs the secure operations of many non-governmental companies?a) Federal Information Security Management Act of 2002 (FISMA)b) Clinger-Cohen 1996 or Information Technology Management Reform Act (ITMRA)c) Sarbanes-Oxley Act of 2002 (SOX)d) Carnivore/DCS-1000Information AssuranceExam 1 Page 2 9/20/2006NetID: Key8. You have been told to come up with mechanisms to implement the following policy.Employees must eliminate all copies of physical and electronic mail that are more than one year old. Identify one mechanism that is procedural (i.e. Does not rely on computer automation) and another mechanism that uses computer assistance. (8 points total)There are many possible mechanisms that would satisfy the policy. Here are two examples.A procedural mechanism: Every month each manager randomly selects an employee, and the manager reviews his computer and physical files for evidence that expired mail has been appropriately deleted.An automated mechanism: Install a new mail system that enables the automatic expiration of electronic mail files after they have been around for a certain amount of time. The automated approach does not help with physical copies. You could ban printing mail and configure your computers so the print options are disabled to discourage email printing. Or you could invest in hi-tech paper that crumbles after your target period.Information AssuranceExam 1 Page 3 9/20/2006NetID: Key9. (4 points each, 12 total) Consider the set of rights {read (r), write (w), execute(x)} plus copy versions of each right {copy-read(cr), copy-write(cw), copy-execute(cx)}a) Using the HRU command primitives and conditions, write a command copy_all_rights(p,q,s) that copies all rights p has on object s over to q.Strictly speaking you will need to test for and copy each right. Some folks will no doubt do A[q,s] = A[p,s] which should net partial credit.I also gave full credit to people who gave the plain right without checking or the copy version.copy_all_rights(p,q,s) if cr in A[p,s] and r in A[p,s] then enter r in A[q,s] if cw in A[p,s] and w in A[p,s] then enter w in A[q,s] if cx in A[p,s] and x in A[p,s] then enter x in A[q,s] if rc in A[p,s] then enter rc in A[q,s] if wc in A[p,s] then enter wc in A[q,s] if xc in A[p,s] then enter xc in A[q,s]b) Modify your copy_all_rights command so only the base rights not the copy aspects of the rights are copied.In this portion, you need to check for the copy right before passing on the regular versioncopy_all_rights(p,q,s) if rc in A[p,s] and r in A[p,s] then enter r in A[q,s] if wc in A[p,s] and w in A[p,s] then enter w in A[q,s] if xc in A[p,s] and x in A[p,s] then enter x in A[q,s]c) Conceptually, what is the effect of copying the copy flag along with the base right?By copying over the copy flag, the original subject loses control over where the right will spread. Beyond delegating the use of the right this enables the target to further delegate the right.Information AssuranceExam 1 Page 4 9/20/2006NetID: Key10. Perform the access tests between the following labels both as sensitivity labels in the Bell-LaPadula confidentiality model and as integrity labels in the Strict Biba model. For each pair of subject and object labels and each model determine which access is granted of read, write (read also implied), and append (pure write, no read implied). For the levels: Supreme > Good > Maybe > Unknown. (2 points each, 12 total)a) Subject=UnknownObject=Supreme:{A,B,C} Supreme:{A,B,C} dominates Unknown:{} BLP: append – matches the *-propertyBiba: read – matches the integrity version of the simple security conditionb) Subject Good:{C}Object=Good{A,C}Good:{A,C} dominates Good:{C}BLP: append – matches the *-propertyBiba: read – matches the integrity version of the simple security condition c) Subject=Supreme:{A}Object=Maybe:{A,B,C}Supreme:{A} and Maybe:{A,B,C} are incomparableBLP: noneBiba: noned) Subject=Good:{A,C}Object=Good:{B,D}Good:{A,C} and Good:{B,D} are incomparableBLP: noneBiba: nonee) Subject=Unknown:{A}Object=Unknown:{A}Unknown:{A} and Unknown:{A} dominate each otherBLP: read, write, appendBiba: read, write, appendf) Subject=Good:{A,B}Object=Supreme:{A}Good:{A,B} and Supreme:{A} are incomparableBLP: noneBiba: noneDue to conflicting messages from Jodie and Susan, partial credit was given for F if you were assuming the subject


View Full Document

U of I CS 498 - University of Illinois at Urbana Champaign Department of Computer Science

Documents in this Course
Lecture 5

Lecture 5

13 pages

LECTURE

LECTURE

39 pages

Assurance

Assurance

44 pages

LECTURE

LECTURE

36 pages

Pthreads

Pthreads

29 pages

Load more
Download University of Illinois at Urbana Champaign Department of Computer Science
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view University of Illinois at Urbana Champaign Department of Computer Science and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view University of Illinois at Urbana Champaign Department of Computer Science 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?