Security Flashcards

1
Q

what is the main concern for the OS in terms of security

A

separate users and processes in memory and the filestore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how do we block users from changing the OS

A

privilege levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how is a users account protected

A

a hash is used to encrypt

the password file is salted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is salting

A

add an extra substring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what do firewalls protect

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how are files protected

A

access control and permissions as part of the filing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how are processes protected

A

privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does setUID do

A

allow untrusted users to run trusted code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a buffer overflow attack

A

overfill the buffer to get a pointer to an unauthorised location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a denial of service attack

A

overload the server until it breaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what processor privilege levels are there

A

user and supervisor

supervisor can do anything, whereas user is restricted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

where are privileges set

A

page tables, MMU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

when does a user switch to supervisor

A

reset

system calls

interrupts

memory faults

emulator trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how would you overcome a buffer overflow attack

A

don’t assume inputs are always legal

use a canary- a random value checked by the compiler

make target stack space non executable

address randomisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

describe hardware vs software privilege

A

users can be user or superuser. this determines who can run a program

when it comes to serving system calls, this is a hardware privilege. no matter whether the user is superuser or not, to service a system call the hardware privilege must be changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly