Chapter 2 Flashcards

1
Q

Basics of a program

A
  • Data resides in RAM: numbers and other coded data, stored in consecutively numbered locations
  • Programs are lists of instructions
  • Instructions reside in RAM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sections of RAM

A
  • Control Sections: instructions and unchanging data

- Data sections: variables that change, stack, heap, BSS Segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Memory Layout

A

low -> high

text
data
bss segment
heap (goes down)
stack(goes up)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stack Frame for function call

A

local variables, parameters, return address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Process

A

A running program

isolated and contained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operating system

A

In charge of process management, dispatching, RAM Management (MMU), I/O management (file management, user interface, network protocols)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Buffer Overflow: The Morris Worm

A

First major internet worm

disabled 10% of computers

utilized buffer overflow(program fails to keep track of input, input modifies RAM it shouldn’t and an attacker can take over)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Finger Program

A

Retrieved info about other users, was vulnerable to buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Buffer Overflow

A

When calling another procedure we have to save the PC on the stack, overrunning a buffer can modify data on the stack and potentially overwrite the PC causing the wrong instruction to be executed when the procedure is finished.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Execution Prevention (DEP)

A

Protective measure where the OS will only execute instructions in a control section not the data section. Not all systems or programs can use DEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Lessons from Morris Worm

A

1) Pick good passwords
2) Patch Regularly
3) Review System Configuration
4) created CERT (computer emergency response team) which was first nationwide computer security team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Common Vulnerability Enumeration (CVE)

A

Tracks and reports problems with security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ways to study cyber attacks

A

1) Attack Scenarios

2) Attack Case Studies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attack Scenario

A

Goals: Describe goals of attack

Resources: Required personnel, skills, equipment

How it happens: descibe how it takes place

Collateral Results: attack results in addition to the goals noted above

Recommended Mitigation: basic steps that could prevent attack

References: authoritative sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attack Case Study

A

Overview: summarizes the attack

Perpetrator: brief description of threat agent

Attack Scenario: as previously described

Risk Management: how pre-attack risk management affected outcome

References: consolidated list including those from the attack scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Access Control Strategies

A

1) Islands
2) Vaults
3) Puzzles
4) Patterns

17
Q

Islands (access control strategy)

A
  • We can only touch what is there
  • processes are islands (think of the Von Nuemann Model of memory)
  • isolation and mediation
  • not allowed to access resources
18
Q

Vault (access control strategy)

A
  • We can retrieve things from the vault only if allowed
  • something restricts access
  • least privilege

Think of a bank safe deposit box: we have the key, the banker lets us retrieve the box, we can modify contents, we can’t retrieve or modify other boxes

This is how permissions work in regards to files and processes

19
Q

Puzzles (access control strategy)

A

Protect data by presenting a puzzle (authorized users no the answer)

Security Through Obscurity (weak puzzle such as protecting data by hiding it)

Strong puzzles use cryptogrophy

20
Q

Patterns (access control strategy)

A

Make decisions based on similarities

antivirus software searches computer for patterns found in viruses

biometrics work of patterns

Problems: false positives and false negatives

21
Q

Open Design (A Basic Principle)

A

We open our systems for third party analysis to help ensure effectiveness

withhold changeable, secret information

Kerckhoff’s Principle: rely on a changeable secret but make the rest of the design public and open to review

Shannons maxim: the enemy knows the system

22
Q

Kerckhoff’s Principle

A

ely on a changeable secret but make the rest of the design public and open to review

23
Q

Shannons maxim

A

the enemy knows the system

24
Q

Chain of Control (A Basic Principle)

A

we must never run programs that violate or bypass our security policy. to avoid, we

1) Start the computer using a BIOS that maintains our security policy
2) If the software we start (i.e. the OS) can start other software, then the other software complies with the security policy or is constrained from violating the policy via access restrictions or other mechanisms

25
Q

Ways of subverting Chain of Control

A

At BIOS we may:
-boot a different OS that doesn’t enforce access restrictions

Inside the OS:

  • Install a privileged program that can bypass access restrictions
  • trick an authorized user into leaking sensitive files
26
Q

How to Keep processes seperate

A

Hardware: (CPU)

  • Program Modes
  • RAM protection

Software: (OS)

  • Program Dispatcher
  • Memory Manager
  • User Identities
27
Q

Program Modes

A

Kernel/Supervisor Mode

  • Highly privileged programs with full CPU access
  • dangerous

User Mode:

  • for most programs and all applications
  • CPU blocks any attempt to use Kernel mode instructions
28
Q

3 Types of Security Controls

A

Physical, Logical, Procedural

also there are three categories: Preventative, Detective, Corrective

29
Q

CIA Properties plus 2

A

Confidentiality

Integrity

Availability

Authentication

Nonrepudiation