TCB Concepts
TCB Concepts
Models
Security Architecture and Models :
Introduction
Defining the Trusted Computing Base –Rings of Trust
Protection Mechanisms in a Trusted Computing Base
TCB
3. Hardware segmentation
It relates to the segmentation of memory into protected segments It
prevents user processes from being able to access both another
process’s allocated memory and system memory.
4. Layering
A process operation is divided into number of layers to perform
various function Each layer deals with particular type of action.
5. Abstraction
It is a process of defining a specific set of permissible values as well as
operations for an object This will help in maintain security by ignoring
implementation details.
6. Data hiding (also known as information hiding)
It is process of assuring that information available at one processing
level is not available in another, regardless of whether it is higher or
lower
Information Storage
• It refers to the parts of a computer system that retain a
physical state for some interval of time ,possibly even after
electrical power to the computer is removed.
• Types used for data or Information Storage
• 1.Primary Storage
• 2.Secondary Storage
• 3.Real Memory
• 4.Virtual Memory
• 5.Random Memory
• 6.Sequential Storage
• 7.Volatile Memory
Information Storage-Primary Memory
• Primary storage: It is the computer’s main
memory that is directly addressable by the
CPU.
• Primary storage is a volatile storage medium
• The content of the physical memory are lost
when the power is removed
Information Storage-Secondary Memory
• It is Non volatile storage format
• Here Application and system code data can be
stored when system not in use.
• Example: USB drives, Memory sticks and
Tapes.
Information Storage-Real Memory
• Real Memory:
A program has been given a definite storage
location in memory and direct access to a
peripheral device.
This is common with database system that
controls how storage is used outside of the
control of the OS.
Information Storage-Virtual Memory
• Virtual Memory:
• It extends the volume of the primary storage
by using secondary storage to hold the
Memory contents.
• In this way Os can run programs larger than
the available physical Memory
• Virtual Memory swapped in and out of
primary Memory when needed for Processing
Information Storage-Random
Memory
• Random Memory:
• It is the computer’s Primary Working and
Storage area.
• It is addressable directly by CPU and stores
application or system code in addition to data
Information Storage-Sequential
• It is the Computer Memory that is accessed
sequentially
• Example: Magnetic Tape
Information Storage-Volatile Memory
• Volatile Memory:
• It means that there is a complete loss of any
stored information when the power is
removed
Open System and Closed system
• Open System vs. Closed System
• Closed systems are of a proprietary nature. They
use specific operating systems and hardware to
perform the task and generally lack standard
interfaces to allow connection to other systems
• An open system uses standard interface that
allows connections between different systems
This system gives full access to users.
• 1. Multitasking
• Multitasking is a capability of running multiple
tasks at a time in synchronized way
Open and Closed System
2. Multiprogramming :
Multiprogramming allows execution of multiple programs.
4..Finite-state machine:
It is a device which stores state of process at a given time. The
operation of finite state machine is based on the input given to the
device. According to the input given, it will change the output or the
state that is already stored. The new state is depending upon the
old state and input
System Security Awareness Concepts
• 1.Functional Requirements
• 2.Goals of Security Testing
• 3.Formal Security Testing Models
System Security Assurance Concepts
IT Security System has two types of
requirements:
1) Functional requirements : Describe
what a system should do
2) Assurance requirements : Describe
how functional requirements should
be implemented and tested.
Goals of Security Testing :
• It verifies that the functions designed
to meet a security requirement operate
as expected .
• In addition, it validates that the
implementation of the function is not
flawed or random.
Formal Security Testing Models
Formal Security Testing Models
1. Trusted Computer System Evaluation Criteria
(TCSEC) United States in the early 1980s
2. Information Technology Security Evaluation Criteria
(ITSEC) Europe in 1991 by the European Commission
3. Canadian Trusted Computer Product Evaluation
Criteria (CTCPEC) Canada in early 1993
4. Federal Criteria for Information Technology
Security (FC) United States in early 1993
5. Common Criteria Today’s standard
Trusted Computer Security Evaluation Criteria