Application and OS Security Flashcards

1
Q

What is the main function of an OS from a bottom up view?

A

A collection of computer programs that manage the computer’s resources, such as the CPU , memory, disk drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main function of an OS from a top-down review?

A

A collection of computer programs that provide an interface between a user and the hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does each device have connected to the bus?

A

a device controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a device driver do?

A
  • communicates with the device controller

- enables data to be transferred between buffer and main memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What must a CPU be able to do?

A
  • distinguish between OS and application programs

- prevent application programs from executing privileged instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When is a bootstrap program loaded?

A

at power up or reboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a bootstrap?

A

a technique of loading a program into a computer by means of a few initial instructions which enable the introduction of the rest of the program from an input device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is firmware?

A

a combination of a hardware device and computer instructions or computer data that reside as read-only software on the hardware device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does BIOS mean?

A

Basic Input/output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary role of the BIOS?

A

to initialise and test hardware components and load the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What could malicious BIOS modification lead to?

A
  • a permanent denial of service

- a persistent malware presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 5 steps of booting?

A
  1. execute BIOS boot block
  2. initialise and test low-level hardware
  3. load additional firmware modules
  4. select boot device
  5. use boot loader to load OS and run it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what does UEFI stand for?

A

Unified Extensible Firmware Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do UEFI specs define?

A

interface between OS and firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are 3 ways the bootloaders can be attacked?

A
  • user-initiated installation of new BIOS code (most difficult to address)
  • malware could re-flash the system BIOS
  • network-based system management tools could cause an organisation-wide BIOS update attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SMM?

A

System Management Mode - an operating mode of x86 CPU

17
Q

What rootkits are in ring 3?

A

Usermode rootkits

18
Q

What rootkits are in ring 0?

A

Kernelmode rootkits

19
Q

What rootkits are in ring -1?

A

Hypervisor rootkits (bluepill)

20
Q

What rootkits are in ring -2?

A

SMM rootkits

21
Q

What does TPM stand for?

A

Trusted platform module

22
Q

What is a TPM designed for?

A
  • a chip with low cost
  • embedded in a computing platform
  • TPM is an international standard for a secure cryptoprocessor
23
Q

What is a cryptoprocessor?

A

a dedicated microcontroller designed to secure hardware through integrated cryptographic keys

24
Q

What does the TPM provide?

A
  • a random number generator
  • facilities for the generation of cryptographic keys
  • remote attestation to create a nearly unforgeable hash key summary of the hardware and software configuration
  • binding: encrypts data using the TPM bind key
  • sealing: specifies the TPM state for the data to be decrypted
25
What types of TPM are there?
- Discrete - Integrated - Firmware - Software - Virtual
26
What are the 2 main application attacks?
"user provided input" and "interactions with other systems"
27
What is a symlink attack?
attacker creates symlink to file accessible only to the superuser
28
What are command line attacks?
directory traversal in path names, command injection attacks, buffer overflows
29
what assumption do buffer overflow attacks make?
inputs will be smaller than a certain size and the buffer is created to be that size.
30
What is the problem with buffer overflow attacks?
detectability
31
What happens in a remote attack?
the attacker manipulates the behaviour of applications over a network connection
32
What is the goal of a remote attack?
execute operations on attacked host
33
What happens in a local attack?
the attacker manipulates the behaviour of applications through local injection
34
What does a local attack assume?
there's a previously established presence on the machine
35
what is the goal of a local attack?
to execute operations with different/superior privileges