os security intro Flashcards

1
Q

what is os security

A

measures and mechanisms implemented to protect the os from threats vulnerabilities and unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is access control

A

controlling the resources that a user can access based on authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

authentication

A

verifying the identity of a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

authorization

A

granting and restricting access based on the users roles and permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the active entity

A

the subject
user/process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the passive entitiy

A

the object
the file/resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

discretionary access control

A

the owner of the resource decided who is allowed access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

mandatory access control

A

a system-wide policy decides who is allowed access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are user identifiers

A

unique numbers assigned to users to identify and manage their access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the five types of user identifiers

A

user id uid
group id gid
effective uid euid
real uid ruid
saved uid suid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

uid

A

assigned to each user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the uid of the root and why is this special

A

0
gives unrestricted access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

gid

A

assigned to a group of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are two benefits of gid

A

more effective as you dont need to configure permissions for each user
easier to modify permissions for the group rather than each user separately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

euid

A

determines permissions for processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ruid

A

the uid of the user who started the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

suid

A

allows a process to switch back to privileged uid after temporarily dropping privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

nobody uid

A

massive number
used for running untrusted processes so it has minimal priveleges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

how does assigning uid work

A

when a user logs in the system designs their uid and guid and all the files and processes created by them have the same uid and gid
when they attempt to access a resource the permissions are checked against their uid and gid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are two of the potential threats with access control

A

privilege escalation
uid reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

how is uid reuse a potential threat in access control

A

reassigning the uid to a new user may mean that they still have the same privileges of the old user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

how is privilege escalation a potential threat in access control

A

hackers can exploit a misconfigured uid to gain privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is file system security

A

protecting files and directories via permissions and encrypting sensitive data to avoid unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are the three parts of file permissions (+ explain them)

A

ownership: all owned by a specific user/group that decide the permissions
permission types (r, w, x)
levels: user(owner) , group, others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

which two apps can we use to check the integrity of a file and what exactly do they do

A

tripwire
aid
checks for unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what is the concept of least privilege

A

is privileges are appropriate they’ll allows processes and users to have the least privileges required to carry out their tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what are the uid 1-999 reserved for

A

for system services and daemons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

how does file permissions work in linux

A

rwx stored together for user, group and others with - if they dont have that permission
e.g. rwxr—–

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

process isolation

A

ensures that each process has its own space so they dont interfere with each other and access/ corrupt each others memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what is an example of process isolation

A

windows container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

memory protection

A

ensures that a process only accesses authorised memory regions
prevents unauthorised access to the kernel and other memory regions

32
Q

how do privilege levels work in process and memory protection

A

separate user and kernel space
the user has limited access whilst the kernel has access to all software hardware and memory resources

33
Q

what are the three potential threats in process and memory protection

A

denial of service
privilege escalation
buffer overflow

34
Q

how do we mitigate privilege escalation in process and memory protection

A

strict separation between user and kernel mode

35
Q

how do we mitigate dos in process and memory protection

A

resource limits and process scheduling

36
Q

what is a buffer

A

a contiguous memory block that stores data temporarily

37
Q

how do attackers use buffer overflows to their benefit

A

overwriting memory via exploiting poorly written code to execute malicious code

38
Q

what can an attacker do with a buffer overflow

A

add an account
control the app remotely
alter the system configuration
force the program to execute commands to the cmd shell

39
Q

what are the three types of messages with buffer overflows

A

bus error
segmentation error
general protection fault

40
Q

segmentation error + general protection fault

A

memory protection deny access: usually means that theres a buffer overflow

41
Q

bus error

A

memory doesnt exist

42
Q

what are some good practices for memory and process protection

A

secure coding to avoid buffer overflows
enabling security features
regular software updates
limit privileges
monitor and audit

43
Q

what are some security features that can be enabled in memory and process protection

A

alsr: address space layout randomisation
nx: non-executable

44
Q

alsr: address space layout randomisation

A

random memory allocation to attackers dont know where the buffers are

45
Q

nx: non-executable

A

protected areas

46
Q

patch management

A

applying security patches(updates) regularly and updating the os to fix vulnerabilities and bugs

47
Q

what are the four types of patches

A

security
bug fixes
feature update
performance patches

48
Q

security patches

A

fix vulnerabilities that could be exploited by hackers

49
Q

big fixes (patches)

A

resolve bugs causing crashes and errors

50
Q

feature updates (patches)

A

new functionality/ improve existing features

51
Q

performance patches

A

optimise os usage and increase software performance

52
Q

what are the four types of audits

A

security
compliance
operational
forensic

53
Q

security audit

A

evaluate the effectiveness of security control and identify vulnerabilities

54
Q

compliance audit

A

ensure adherence to regulated requirements

55
Q

operational audit

A

assess efficiency and effectiveness of operational processes

56
Q

forensic audit

A

investigate security incidents/breaches to determine the cause and impact

57
Q

what are the five types of logs

A

system
application
security
network
audit

58
Q

system log

A

record system events
e.g. shutdown

59
Q

application logs

A

track events within specific apps
e.g. login attempts

60
Q

security logs

A

security related events
e.g. authentication

61
Q

network logs

A

monitor the network for traffic and connections

62
Q

audit logs

A

track user activities for accountability

63
Q

what are the best practices for auditing and logging

A

enable comprehensive logging
centralise log management
protect logs
regularly review logs
retain logs
conduct regular audits

64
Q

what do we mean by enable comprehensive logging

A

ensure all critical components generate logs and are logging relevant details
e.g. timestamps, uid pid

65
Q

how do we centralise log management

A

collect and analyse logs from multiple sources

66
Q

how do we protect logs

A

encrypt and restrict access to logs
user write-once storage to prevent tampering

67
Q

why and how do we regularly review logs

A

to detect anomalies via automated tools

68
Q

how do we retain logs

A

should keep them for a time period as defined by policies and regulations
they should be archived for future reference

69
Q

why do we conduct regular audits

A

we can use audit trails to investigate incidents and track changes

70
Q

auditing

A

reviewing and analysing logs and records to detect anomalies

71
Q

logging

A

recording events and activities in the system/app/network

72
Q

what are the 6 key components of patch management

A

inventory and assessment
vulnerability monitoring
patch acquisition
testing
deployment (deploy after testing)
verification and documentation

73
Q

inventory and assessment (patch management)

A

maintaining an inventory of hardware and software
identify which applications require patches

74
Q

vulnerability monitoring (patch management)

A

using vulnerability scanners to find new vulnerabilities and patches

75
Q

patch acquisition (patch management)

A

downloading patches from trusted sources and verifying their integrity via checksums/digital signatures

76
Q

testing (patch management)

A

testing patches in a controlled environment and checking for compatibility with the system/apps
usually dont by the company deploying them

77
Q

verification and documentation (patch management)

A

check theyre successfully applied and functioning correctly
monitoring for issues
maintain records of patching activities - which ones have been applied where and when