Chapter 4 Flashcards

1
Q

Sharing files securely with other users on the system

A

Create a folder visible to Bob and Tina, The folder actually belongs to the “survey” group and one user owns each file where the file’s group is a seperate setting. Owner “RW”, Group: “RW”, world”—”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Administrative groups

A

User Ids part of this group may perform administrative tasks. Users in the Admin group automatically have administrative rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privileged User IDs

A

Classic Unix had root user id and admins would log in as root, the problem was the system ouldn’t tell which admin performed the task, there was no ACCOUNTABILITY. Modern Unix as SUDO and SETUID which you use to execute a privileged operation as root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dangers of Administrative roles

A

if an admin executes a trojan or virus the malware can use the admin rights to modify the OS itself, Safe alternative: temporary rights (UAC) or have to user Ids one that has no special privileges and another which does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

File Permission Flags

A

Three sets of RWX flags: 1) Owner rights (called user rights or u) 2) Group rights (called group rights or g) 3) world rights(called other rights or o) specified in that order eg: rwxrwxrwx, gives everyone full access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

chmod

A

changes access permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

chown

A

changes owner of a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

chgrp

A

changes group associated with a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ps

A

displays current running processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Windows ACLs

A

present in Professional, Business, and sophisticated versions of the OS. Lists out the permissions of a specific user or group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transitive Trust (A BASIC PRINCIPLE)

A

If we trust Program 1, and it trusts Program 2, then we are also trusting program 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Monitoring System Security

A

Effective security requires monitoring. ACLs are preventative, monitoring is detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Event Logging Process

A

Program->Log input buffer->Logging proccess-> Audit Log->Log viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ANSI X

A

Security standard used by banking industry to protect electronic funds transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PCI-DSS

A

security standard used by payment card industry to protect credit card transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ISO 27000

A

Family of international standards for security system quality improvement.

17
Q

Government Standards

A

FIPS, SOX, HIPAA, GLBA, FISMA