60 Chapter 3 ■ Security Architecture and Engineering (Domain 3)
- In the figure shown here, Sally is blocked from writing to the data file by the Biba integ-
rity model. Sally has a Secret security clearance, and the file is classified Top Secret. What
principle is preventing her from writing to the file?
Write Request
Sally Data File
A. Simple Security Property
B. Simple Integrity Property
C. *-Security Property
D. *-Integrity Property
- Match each of these following numbered architecture security concepts with the appropriate
lettered description:
Architectural security concepts
- Time of check
- Covert channel
- Time of use
- Maintenance hooks
- Parameter checking
- Race condition
Descriptions
A. A method used to pass information over a path not normally used for communication
B. The exploitation of the difference between time of check and time of use
C. The time at which the subject checks whether an object is available
D. The time at which a subject can access an object
E. An access method known only to the developer of the system
F. A method that can help prevent buffer overflow attacks
- What is the minimum number of independent parties necessary to implement the Fair
Cryptosystems approach to key escrow?
A. 1
B. 2
C. 3
D. 4