SU03: Access Control and System Security Flashcards
1
Q
Types of Access Control
A
- Mandatory access control (MAC)
- Discretionary Access Control (DAC)
- Role-based Access Control (RBAC)
2
Q
MAC, DAC, RBAC control based on
A
- MAC: **security labels & security clearances. **Strict; useful for army
- DAC: subjects & access rules. Flexible, Messy. e.g. Google Docs
- RBAC: roles subjects have & rules stating which roles can access what objects. not as flexible as DAC but easier to manage (centrally controlled)
3
Q
Types of Security threats
A
- Intruders: hackers poise threats to OS
- Malicious software
- Buffer Overflow
4
Q
3 Types of Intruders
A
- Masquerader (outsider): break system’s access control pretending to be another user
- Misfeasor (insider): misue privilege/access resources they don’t have authorisation for
- Clandestine (Insider/outsider): have root control of system & bypass access control
5
Q
2 Types of Malicious software
A
- Indepedent (Worm): self-contained, self-duplicated programs. Self-duplicated, can be ran by OS
- Co-host (Virus): parasitic, need to attach to other programs
Other examples: Trojan Horse, Ransomware
6
Q
3 occurences in Buffer Overflow
A
- process attempts to overwrite adjacent memory location leading to programming error
- attacker gain control in program
- attacker use Metasploit against unpatched system & get shell remotely
7
Q
3 Countermeasures, what they do
A
- Authentication: identify & verify users are whom they claim to be. Strengthen using 2FA
- Access control: system to give correct access right after authentication
-
Buffer Overflow countermeasures:
* compile-time defence: harden programs
* Runtime defence: detect & stop attacks in executing programs
8
Q
6 Steps in Hardening OS
A
- OS installation & patching
- remove unnecessary services, applications, protocols
- Configure users, groups, permissions
- install & configure additional security controls
- Test system secuirty
9
Q
OS installation & patching - 4 parts
A
- proper planning of OS installation
- minimise software package
- take care booting process
- use cryptographic file systems
10
Q
Remove Unnecessary services, applications, protocols
A
- Use System planning: resolves conflict of usability and security
- Unnecessary services shouldn’t be installed
11
Q
Configure Users, Groups, Permissions - 3 parts
A
- do not give more access than what’s required
- careful categorisation of groups
- justify additional group of users
12
Q
Install & Configure Additional seucrity controls - 2 parts
A
- Implement additional security controls (firewalls, antivirus, instrusion system)
- update antivirus software on definition files/signarures
13
Q
test system security - 2 parts
A
- make sure implementation works
- depending on OS, use checklsit