Operating System Security (PPT 7) Flashcards

1
Q

What is Security?

A

It is the collective name given to tools, resources and administrative procedures that are designed to protect computing data and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four key areas to protect?

A

Protection
-Access to the data must be controlled

User Authentication
-Access to the computer facility must be controlled

Network Security
-Data must be securely transmitted through networks

File Security
-Sensitive files must be secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four types of generic computer threat?

A

Interruption
-System assets become unavailable (e.g. cutting off connection)

Interception
-Unauthorized access to system asset (e.g. hacker copying files)

Modification
-Unauthorized modification to a system asset (e.g. virus changing a program or destroying data)

Fabrication
-Unauthorized faking of an object in the system (e.g. adding records to a file)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a virus?

A

It is a small program that can attach itself to an existing program. When the infected program is run, the virus code is also run. When a virus is run, it can try and replicate itself. If it runs fast enough, the user is unlikely to notice it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Stealth Virus?

A

It is a virus which attempts to cover itself up. One way is to compress the original file so it still appears to be the same size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are five security design principles?

A
  • Least privilege
  • Small, uniform security
  • Acceptability of the security measures
  • Complete mediation
  • Open design
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Least Privilege Security?

A
  • processes operate using the smallest number of privileges possible
  • default is “no access allowed”
  • privileges gained by explicit permission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Small, Uniform security?

A
  • small and uniform implies easy to verify their correctness

- part of design, rather than ad-hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Acceptability of security measures taken?

A
  • shouldn’t get in the way of the user’s work

- if security mechanisms are difficult to use, they might be ignored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Complete Mediation?

A
  • every access checked against access rights

- including those during maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Open Design?

A
  • the effectiveness of security measures should not depend upon secrecy of the design of the mechanisms themselves
  • people will eventually discover the mechanism anyway
  • mechanisms can be reviewed by several experts if they are not secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two types of protection?

A
  • User-oriented control of access

- Data-oriented control of access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is User-oriented control of access?

A

Most common version of this is login. Where control access is down to the user.
Can be bad as passwords can be forgotten or easily hacked as people make easy to guess passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Data-Oriented Access control?

A

We try to control which processes can do which operations to which files and programs. We define an object to be anything which access is being controlled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does Windows do Data oriented access control?

A

Each process has an access token and each object has a security descriptor. When a process tries to perform an operation on an object, Windows uses the process’s Access token to check the security descriptor to ensure that this operation is allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Access Token store?

A

-Security ID (SID)
A unique number which identifies the user uniquely across all machines on the network
-Group SIDS
A list of the groups to which the user belongs
-Information on privileges, owner

17
Q

What does a Security Descriptor store?

A
  • Owner (the SID or Group SID of the owner)
  • Flags indicating what is all present in the Security Descriptor
  • Discretionary Access Control List (DACL)
  • System Access Control List (SACL)
18
Q

What does DACL do?

A

Discretionary Access Control List

-Determines which users or groups can access an object

19
Q

What does SACL do?

A

System Access Control List

-Specifies what kinds of object should generate audit messages

20
Q

What does DACL store?

A

-Header
-SID or Group SID plus an Access Mask (as many as needed)
Access mask states the way in which that SID can operate on this object

21
Q

How is DACL used?

A

When a process tries to perform an operation on an object, Windows does the following:

  • gets this process’s SID and Group SID from the Access Token
  • Looks down the Discretionary Access Control List in the object’s Security Descriptor to try and find a matching SID in the list
  • When found, the Access Mask is consulted to see if the requested operation is permitted
22
Q

What are the basic PC security items?

A

Firewall and Malware protection. Some of this is provided by your local network and some will have to be on the workstation

23
Q

What types of malware protection do you need?

A
  • On access scan to prevent malware getting in the system in the first place
  • Off line scan ability to run system scans to detect and delete or quarantine malware that has got onto the system
24
Q

What does an Integrated Package for security contain?

A
  • malware protection
  • firewall
  • program control
  • spam control, anti-phishing strategy
  • parental control, privacy & cookie control