Lecture 07 - Security in Ordinary OS Flashcards
Root User
System principal with unrestricted access
Setuid
Switching to root user for system services
Labeling State
Ad hoc system for associating processes with identities
Primary Group
Main group defined in /etc/passwd for users
Authentication Process
Login, password encryption, and user identity setup
UID Transitions
Complex transitions among UIDs in UNIX
UNIX Objects Representation
Files representing various system objects in UNIX
Mode Bits
Permissions for owner, group, and others in UNIX
File Permissions
Control read, write, execute access for owner, group, others
Chroot
Confining a process to a specific file system subtree
Confused Deputy Problem
Misuse of authority by a program, like overwriting system files
Mount Vulnerabilities
Security issues related to mounting filesystems
/tmp Vulnerability
Potential attacks by creating files in shared spaces like /tmp
Snort
Free Intrusion Detection System detecting network attacks
Nessus
Security scanner probing system and app vulnerabilities