Chapter 4 Flashcards
Sharing files securely with other users on the system
Create a folder visible to Bob and Tina, The folder actually belongs to the “survey” group and one user owns each file where the file’s group is a seperate setting. Owner “RW”, Group: “RW”, world”—”
Administrative groups
User Ids part of this group may perform administrative tasks. Users in the Admin group automatically have administrative rights
Privileged User IDs
Classic Unix had root user id and admins would log in as root, the problem was the system ouldn’t tell which admin performed the task, there was no ACCOUNTABILITY. Modern Unix as SUDO and SETUID which you use to execute a privileged operation as root
Dangers of Administrative roles
if an admin executes a trojan or virus the malware can use the admin rights to modify the OS itself, Safe alternative: temporary rights (UAC) or have to user Ids one that has no special privileges and another which does.
File Permission Flags
Three sets of RWX flags: 1) Owner rights (called user rights or u) 2) Group rights (called group rights or g) 3) world rights(called other rights or o) specified in that order eg: rwxrwxrwx, gives everyone full access rights.
chmod
changes access permissions
chown
changes owner of a file
chgrp
changes group associated with a file
ps
displays current running processes.
Windows ACLs
present in Professional, Business, and sophisticated versions of the OS. Lists out the permissions of a specific user or group.
Transitive Trust (A BASIC PRINCIPLE)
If we trust Program 1, and it trusts Program 2, then we are also trusting program 2.
Monitoring System Security
Effective security requires monitoring. ACLs are preventative, monitoring is detective
Event Logging Process
Program->Log input buffer->Logging proccess-> Audit Log->Log viewer
ANSI X
Security standard used by banking industry to protect electronic funds transfers
PCI-DSS
security standard used by payment card industry to protect credit card transactions