Week 9, 10 and 11 Flashcards

1
Q

What is a distributed system? and what are the reasons for having one?

A

loosely coupled processors connected by a communication network

reasons

  • resource sharing
  • computation speedup
  • reliability
  • communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between Network Operating systems vs Distributed operating systems?

A

network: users are aware of network, users are aware of local vs remote resources

Distributed: Users are not aware of network, data migration, computation migration, process migration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Def: Data Migration

A

network file systems (in distributed operating systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Def: computation migration

A

remote procedure call, stored procedures in databases (in distributed os)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Def: Process Migration

A

Load Balancing,computation speedup, clusters (distributed OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network topology:

fully connected vs partially connected

A

fully: expensive, but every node direct to other nodes
Part: variety of possible connections, combinations possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

LAN vs WAN networks

A

LAN: Local Area Networks
- high speed, high cost , Ethernet, short distance
WAN: Wide Area Network
- Long Distance, Internet, provate networks, routers, slow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Def: Service

A

software entity running on one or more machines providing a particular function (file access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Def: Server

A

a machine running the service software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Def: Client

A

process that can invoke a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Def: Client interface

A

operations on the service available to clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Def: peer to peer

A

when machines are both a server and a client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is Distributed file systems transparency?

A

remote and local disks look the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Def: Location Transparency
Def: Location Independece

A

trans: (static) name does not reveal location - share files
indep: (stronger, dynamic) name does not change in location changes, file migration - shares space

  • separate naming hierarchy from storage hierarchy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three approaches to file naming?

A
  1. host + location
  2. Attach remote directories to local directories
  3. total integration (global name structure spans all files)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are stateful connections?

A

connections between client and server is persistent, server keeps track of all clients

17
Q

Def: stateless

A

each operations is a separate request

18
Q

What are the three meanings of security?

A
  1. Protection and Authentication (users only access information they have privileges for)
  2. System Integrity (prevent execution of code by outsiders)
  3. Information Security (statistical attacks)
19
Q

What are the four security levels?

A

Physical
Human
Network
OS

20
Q

What are statistical attacks?

A

individual pieces of information reveal nothing, collectively they reveal private information, statistics databases

21
Q

What is buffer overflow?

A

The most common attack, exploit bug as security hole

  1. Write binary code into buffer, ending with a value that overwrites the return address and points into the buffer
  2. Subroutine returns into the stack instead of to calling program protection -> don’t allow stack space to be executable!! don’t put buffers on the stack!
22
Q

what is ARM?

A

the return address is stored in the link register. If you do not call any other functions from the function, then leave it alone. Since any calls to a function will use the link register you have to save it on the stack, so still vulnerable

23
Q

when you check the size of the buffer on the stack what does it tell you?

A
  • subtration is unsigned
  • if stmt comparison is signed
  • offset > 2^31, then failure
  • file needs only be a bit longer than 1024 chars - small file
  • should have used seek (seek changes the file read position)
24
Q

What is the canary value?

A

protection against stack overflow

  • random value put on stack before local variables
  • check before return
  • if not the same, then has been modified by a stack overflow attack
25
Q

What is ARP poisoning?

A

a type of attack in which a malicious attacker sends falsified ARP (Address Resolution Protocol) messages over a local area network.

26
Q

How do you protect yourself against ARP Poisoning?

A
  • don’t user replies you did not ask for

- if MACs changes unexpectedly, log changes, so a record available

27
Q

What is pharming?

A

a cyber attack intended to redirect a website’s traffic to another, fake site. (can be conducted by either changing the hosts file of a victim’s computer or by exploitation of vulnerability in DNS server software.

28
Q

What are variants?

A

function pointers in the head within range of a global buffer (simple overwrite)

29
Q

What if the buffer is in the heap (after pointers)?

A
  • unused memory is kept in bins based on size of block

- each bin is represented by a double linked list

30
Q

What are Race conditions?

A

programs that fun with administrator priviledges - make a security check before doing an action (! Don’t execute something the user can change between the check and do)

31
Q

Def: worms

A

Automated program that breaks into another system and creates copy of the new system

32
Q

What is the distinction between work and virus?

A

the vector. Virus needs a human action, worm contains code to attach the next machine

33
Q

What are botnets?

A

A botnet is a number of Internet- connected devices. Botnets can be used to perform distributed denial-of-service attack, steal data, send spam etc.

34
Q

What is an intrusion>

A

signature based detection (virus, multiple login attempts)

anomaly based detection (something not normal)

35
Q

What are Root Kits?

A

Root kit is software to hide the evidence of system modification (often used by viruses and worms to disguise activities)

initial vulnerability is used to gain access, root kit is used to maintain access to compromised system

36
Q

Describe Couter-Intelligence Operations

A

after detecting malware, you provide a simulated environment (including new operator), replace systems it has access to, with fake systems with fake information

user root kit technique to hide the anti malware software from the malware