Chapter 5. System Architecture and Models

Terms you'll need to understand:

  • Buffer overflows

  • Security modes

  • Rings of protection

  • Trusted Computer System Evaluation Criteria (TCSEC)

  • Information Technology System Evaluation Criteria (ITSEC)

  • System vulnerabilities

  • Common Criteria

  • Reference monitor

  • Trusted computing base

  • Open and closed systems

Techniques you'll need to master:

  • Understanding confidentiality models, such as Bell-LaPadula

  • Identifying integrity models, such as Biba and Clark-Wilson

  • Understanding common flaws and security issues associated with system-architecture designs

  • Distinguishing between certification and accreditation

Introduction

The systems architecture and models domain deals with system hardware and the software that interacts with it. This ...

Get CISSP Exam Cram™ 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.