Lecture 14 - Security Flashcards
What 5 broad objectives does security aim to provide?
Confidentiality - prevent unauthorized access
Integrity - ensure data has not been modified
Availability - ensure the system is accessible
Accountability - know who did what
Authentication - authenticate each user
What is a protection domain?
A protection domain specifies the resources that a process may access.
A domain is defined as a set of < object, { access right set } > pairs
How does a protection/access matrix work?
The rows of the matrix represent domains and columns represent files.
Each cell of the matrix represents a set of access rights.
How can an access matrix be compressed?
By columns:
Associate permissions with each object: access control list
By rows:
Associate permissions with each domain: capabilities
In UNIX what 3 domains are ACLs defined for?
File owner
Group
Everyone else
How is a revocation of access rights easier in Access Lists than Capability Lists?
Access list - simply delete the rights
Capability - have to find the process and its list before the right can be deleted
What is the difference between discretionary access control and mandatory access control?
Discretionary: each object has an owner, usually creator, who controls the access rights
Mandatory: creator is not owner, and does not control access rights, they are defined by a security policy
What are the 3 forms of authentication?
Something you know - password
Something you have - key card
Something you are - biometric
What is stack smashing/buffer overflow?
When program reads data into a buffer but does not check size
Data overflows and contains instructions which are then executed