Chapter 3 Flashcards

1
Q

The File System

A

Modern computers keep files in a hierarchy of directories

each file has a path name, list of directory entries to follow to find the file, th efile name selects the right file in the final directory

Files are owned by a user, usually the creator, access rights are tied to user identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CRUD

A

Create, Read Update, Delete

basic rights on files and directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Strategies for protecting a newly created file

A

Use ‘Defaults’ - apply the same access rights to all new files

use ‘inheritance’ - apply the access rights based on the enclosing directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Permissions flags

A

Sets of flags to specify access rights

ex:
RWX = read write, execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Executable Files

A

Files that contain applications or programs

  • Binary executables are stored in a control section and executed by the CPU
  • Scripts contain text interpreted by a programming language interpreter

Must have execute right to execute a file containing a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A

Carried by another program, when the program executes the virus spreads to other programs on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of virus infection

A
  • Application virus infects when it’s run
  • Boot sector virus infects when it’s bootstrapped
  • USB virus infects when plugged in
  • Email virus infects if attachment is run
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer Worms

A

Programs that replicate and travel alone from system to system without the use of a host file.

If a document is infected with a worm, the entire document will travel from computer to computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NonVirus Virus - Hoax

A

Rather than writing an actual virus, criminals send mass emails claiming to be from well known antivirus center and warns of new virus outbreak. The email will instruct users to delete some legitimate files, causing system damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bombs

A

Malware that executes its malicious purpose when a specific criteria is met (e.g. date/time/…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojans

A

Imposter or program files that claim to be something desirable but are in fact malicious. Trojans do not replicate and you must invite them to your computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rootkit

A

Collection of tools that black hats use to mask intrusion and obtain stealthy and privileged access to a computer. Typically subvert antivirus solutions. May consist of utilities that monitor traffic and keystrokes, attack other machines, alter existing system tools, create a backdoor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Macro Viruses

A

Scripts inside other programs (like Excel) that can create, modify, execute other programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Defense Against Malware

A
  • System Hardening
  • Network Hardening
  • Apply security patches
  • implement least privileges
  • reduce attack surfaceby shutting down ports, processes, applications
  • Install antivirus and firewall software
  • continuously monitor all defense controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protecting Files

A
  • OS protections need to always be applied when we access our files
  • There needs to be no way to bypass OS protections
17
Q

Deny by Default/Whitelisting (Basic Principle)

A

Always start by granting no access, we can add access rights. This makes it easier to assign correct permissions and achieve least privilege.

18
Q

Information States

A

1) Storage State: stored in computer, not being processed. “Data at Rest”
2) Processing State: being used by an active process.
3) Transmission State: being moved from one place to another. “Data in Motion”

19
Q

Security Patch Race

A

When a security problem arises developers race to eliminate the problem. Attackers race to write software that exploits the problem.

20
Q

Exploit

A

Attack software that takes advantage of a security problem.

21
Q

Window of Vulnerability

A

Time which an exploit exists but computers aren’t patched.

22
Q

Patching Process

A

1) Collect error reports
2) Prioritize errors
3) Develop software to fix the error
4) Software fixes are chosen for patch
5) patch is tested
6) patch is released

Applies to all fixes not just security fixes.