Chapter 5. System Architecture and Models
Terms you'll need to understand:
Buffer overflows
Security modes
Rings of protection
Trusted Computer System Evaluation Criteria (TCSEC)
Information Technology System Evaluation Criteria (ITSEC)
System vulnerabilities
Common Criteria
Reference monitor
Trusted computing base
Open and closed systems
Techniques you'll need to master:
Understanding confidentiality models, such as Bell-LaPadula
Identifying integrity models, such as Biba and Clark-Wilson
Understanding common flaws and security issues associated with system-architecture designs
Distinguishing between certification and accreditation
Introduction
The systems architecture and models domain deals with system hardware and the software that interacts with it. This ...
Get CISSP Exam Cram™ 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.