Biba Security Model
TheProfezzor
Member Posts: 204 ■■■□□□□□□□
in SSCP
I was going through "Biba Security Model" from different books and I found something strange. Kindly read through.
Biba was designed to address three integrity issues:
The following are the three main goals of integrity models:
AIO Guide to CISSP CBK 6th - Shon Harris
Now, whose right on this?. The two books seem to contradict each other.
Biba was designed to address three integrity issues:
- Prevent modification of objects by unauthorized subjects.
- Prevent unauthorized modification of objects by authorized subjects.
- Protect internal and external object consistency
The following are the three main goals of integrity models:
- Prevent unauthorized users from making modifications
- Prevent authorized users from making improper modifications (separation of duties)
- Maintain internal and external consistency (well-formed transaction)
AIO Guide to CISSP CBK 6th - Shon Harris
Now, whose right on this?. The two books seem to contradict each other.
OSCP: Loading . . .
Comments
-
voodoo26 Member Posts: 56 ■■□□□□□□□□as far as i know that Clark-Wilson addresses 3 rules of integrity and Biba addresses only the first goal.2014 Goals CISSP COLOR=#008000]Passed[/COLOR, 2015 Goals CISM COLOR=#ff0000]June[/COLOR
-
teancum144 Member Posts: 229 ■■■□□□□□□□TheProfezzor wrote: »I was going through "Biba Security Model" from different books and I found something strange. Kindly read through.
Biba was designed to address three integrity issues:- Prevent modification of objects by unauthorized subjects.
- Prevent unauthorized modification of objects by authorized subjects.
- Protect internal and external object consistency
The following are the three main goals of integrity models:- Prevent unauthorized users from making modifications
- Prevent authorized users from making improper modifications (separation of duties)
- Maintain internal and external consistency (well-formed transaction)
AIO Guide to CISSP CBK 6th - Shon Harris
Now, whose right on this?. The two books seem to contradict each other.- Prevent modification of objects by unauthorized subjects.
- Prevent unauthorized users from making modifications
The second bullet doesn't say what is being modified, but "objects" (i.e. data) is implied.
The second bullet of each are also saying the same thing:- Prevent unauthorized modification of objects by authorized subjects.
- Prevent authorized users from making improper modifications (separation of duties)
Again, "objects" is implied in the 2nd bullet.
"Separation of duties" can be implied in the first bullet because restricting authorized users from making unauthorized modifications is how you enforce SOD (it's nice that the AIO guide explicitly states "SOD" to make this connection).
The third bullet of each are also saying the same thing:- Protect internal and external object consistency
- Maintain internal and external consistency (well-formed transaction)
If you like my comments or questions, you can show appreciation by clicking on the reputation badge/star icon near the lower left of my post. -
TheProfezzor Member Posts: 204 ■■■□□□□□□□teancum144 wrote: »Seems to me they're both saying the same thing. Let's start with the first bullet of each:
- Prevent modification of objects by unauthorized subjects.
- Prevent unauthorized users from making modifications
The second bullet doesn't say what is being modified, but "objects" (i.e. data) is implied.
The second bullet of each are also saying the same thing:- Prevent unauthorized modification of objects by authorized subjects.
- Prevent authorized users from making improper modifications (separation of duties)
Again, "objects" is implied in the 2nd bullet.
"Separation of duties" can be implied in the first bullet because restricting authorized users from making unauthorized modifications is how you enforce SOD (it's nice that the AIO guide explicitly states "SOD" to make this connection).
The third bullet of each are also saying the same thing:- Protect internal and external object consistency
- Maintain internal and external consistency (well-formed transaction)
The 3 bullets from Sybex and the 3 bullets from AIO are same. The wording is different but they are same. Sybex is saying that all 3 bullets apply on Biba. AIO says that only number 1 applies to Biba. How can they be same?OSCP: Loading . . . -
teancum144 Member Posts: 229 ■■■□□□□□□□TheProfezzor wrote: »The 3 bullets from Sybex and the 3 bullets from AIO are same. The wording is different but they are same. Sybex is saying that all 3 bullets apply on Biba. AIO says that only number 1 applies to Biba. How can they be same?
- As it turns out, Biba only addresses one of three key integrity goals. The Clark–Wilson model improves on Biba by focusing on integrity at the transaction level and addressing three major goals of integrity in a commercial environment. In addition to preventing changes by unauthorized subjects, Clark and Wilson realized that high-integrity systems would also have to prevent undesirable changes by authorized subjects and to ensure that the system continued to behave consistently. ...
If you like my comments or questions, you can show appreciation by clicking on the reputation badge/star icon near the lower left of my post.