Access Control Flashcards

1
Q

What are the 3 fundamental categories of security techniques?

A

proactive, real-time, reactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 3 entities underlie the design of secure computer systems?

A

reference monitor, reference validation mechanism, trusted computing base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the principals of a reference monitor?

A

the users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a capability?

A

communicable, unforgeable token of authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how do we enforce policies?

A

reference monitor implemented as controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where should you put access control mechanisms?

A

everywhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the 3 reference monitor placement types?

A

stacked, sandbox, embedded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the stacked placement type? Give an example.

A

Where the RM is part of the interface between user space and OS.
example: all modern OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the sandbox placement type? Give an example.

A

the program is executed in an RM-controlled environment.

example: interpreted language (Java)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the embedded placement type? Give an example.

A

the RM is a subcomponent of the program.

example: SQL engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are some reasons for a hardware-near security kernel?

A
  • all mechanisms can be compromised from the layer below
  • the lower the level, the harder to bypass
  • the lower the level, the simpler the code
  • hardware offers best performance for specialized checks
  • higher level of assurance with smaller overhead
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 4 categories for requirements for OS security/

A
  • execution domains
  • process separation
  • memory protection
  • input/output controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OS is both ___?___ and ___?___

A

arbitrator of access requests

object of access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

should users ever be able to modify the OS?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is the classic distinction?

A

user mode vs supervisor mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the principles of the multics protection rings?

A

each ring has access to itself, and all rings outside of itself, but no ring has access to rings inside itself. So ring 0 has access to everything.

17
Q

what is TOCTOU?

A

Time-of-check time-of-use

18
Q

What are the 2 steps to a TOCTOU attack?

A
  1. adversary prepares benign parameters and invokes the call gate
  2. while that call is processed, the adversary modifies parameters to something malicious
19
Q

what are interrupts used for?

A

controlled invocation

20
Q

what can be used to implement system calls?

A

software-invoked interrupts

21
Q

What are 3 examples of malicious use of interrupt redirection?

A

keyboard logging, virus spreading, network manipulation

22
Q

what is the memory hierarchy of modern computing systems?

A

logical memory, segmentation unit, linear memory, paging unit, physical memory

23
Q

describe logical memory

A

environment of processes, is what assembler instructions refer to.

24
Q

describe linear memory

A

flat addressing model, each byte is one address.

address span reflects register size.

25
Q

describe physical memory

A

silicon-produced memory cells, addressed by wires

26
Q

what is a segement?

A

continuous memory area of arbitrary length

27
Q

what is a page?

A

memory slice of fixed size (standard 4kb)

28
Q

what is a local descriptor table (LDT)?

A

a memory table containing memory segment descriptors

29
Q

what is the difference between LDTs and GDTs?

A

every task/thread can have its own LDT

30
Q

What is segmentation?

A

memory division into logical units

31
Q

What is paging?

A

memory division into physical units