Security Flashcards

1
Q

What is the Zero-Day problem in computer security?

A

Vulnrabilityies known to attackers but not yet identified by software vendors (Zero day refers to the amount of time the vulnrability was known for).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is absolute security unattainable?

A

unattainablue due to the Complexity of modern computing systems.
- software and hardware flaws
- humman error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Principle of Least Privilege (PoLP?)

A

PoLP states that a user should be given the minimum level of access necessary to complete their job.
- this helps reduce damage if an account is compromised by limiting acess the attacher would have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between Discretionary Access Control (DAC) and Mandatory Access Control (MAC)?

A

DAC allows users to control the access rights of their files, while MAC policies are enforced by the system administrator and users have limited control over access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SELinux?

A

SELinux (Security Enhanced Linux) is a security framework that implements mandatory access control in the Linux Kernal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SELinux’s modes of operation?

A

Tree Modes:
- Enforcing - policies are enforced and access violations are logged
- Permissive - policies not enforced but violations are logged
- Disabled - SELinux is turned off and no violations are logged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does patch cycle contribute to computer security?

A

It involves discovering vulnerabilities, preparing and publishing patches and users installing them, which helpprotect against known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the benefits of the chmod command in Linux?

A

It changes the premissions of a file or directory. This helps control who has read, write ore execute the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Multi-Catagory Security MCS in SELinux?

A

MCS adds an additional layer of labeling to enforce more granular security policies, preventing processes from accessing resources not explicitly premitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does Multi-Level Security (MLS) work in SELinux?

A

MLS controls process access based on data levels, allowing processes to access data only within their clearance level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly