3.4 Vulns, Threats, Countermeasures Flashcards
protection rings
0 OS kernel / memory (priv.)
1 other OS components (priv.)
2 drivers, protocols (priv.)
3 user level programs, apps (user mode)
communication via system calls
memory
ROM: not writable
PROM: once writable
EPROM: rewritable, uv light
EEPROM: rewritable, electrical
covert channel
any method that is used to pass information over a path that is not normally used for communication and not protected. violates sec policy
storage channels
timing channels
TOCTOU
time-of-check-to-time-of-use discrepancy could be an opportunity for an attacker
security modes
dedicated systems: clearance, permissions and need to know for all users and info
system high mode: clearance, permissions — minus need to know
compartmented mode: clearance — minus access permissions and need to know
multilevel: no requirements
execution types
only multiprocessing uses more than 1 cpu
WORM storage
write once read many
used to support records retention for legal or regulatory compliance. assures integrity
DEP
data execution prevention
prevents data execution in memory locations that are not predefined to contain executable content
ASLR
assress space layout randomizatio
makes explotation difficult by randomizing memory addresses
government cloud
keeps data and resources contained within the borders of one country
maintenance hook
backdoor by system designers for effective system checking during development
OWASP
open web app security project
OWASP TOP10 provides guidance on 10 most significant app sec risks