SB 18: OS Security Flashcards

1
Q

How can you provide assurances when building a system?

A

Thorough analysis of threats and vulnerabilities that apply to the system being built. I.e will the system be connected to the internet?

It is an iterative process that involves threat analysis and definition and eventually provides a full list of all necessary requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a fat-finger error?

A

When an authorized user makes a mistake or inadvertently corrupts or misuses the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a security objective?

A

Abstract high-level requirements meant to “specify” countermeasures to mitigate the threats that have been identified. Provide clues for mechanisms needed to implement the requirements. They help in developing detailed requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some architectural considerations?

A
  1. To determine the primary focus of control of security enforcement mechanisms. The focus lies on controlling data. What kind of access control should be implemented and what privileges can processes and users have.
  2. Should security functions be centralized or distributed among the systems and system components? It is easier to analyze and give assurance if the security functions are centralized however it can become a bottleneck and impact performance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where can a security mechanism be implemented?

A

An OS system is comprised of different levels. It is important to select the correct layer for a mechanism where it is most effective and efficient. Once a layer has been selected you need to think about how to protect the layers below.

For a layer to be secure the layers below it need to have security mechanisms in place as well. It is not always possible to implement the security mechanisms in the desired level due to access restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a reference monitor?

A

An access control concept of an abstract machine that mediated all access to objects by subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a reference validation mechanism (RVM)?

A

An implementation of the reference monitor concept.
1. be tamper-proof
2. always be invoked
3. never be bypassed
4. be small enough to analyze and test
5. the completeness of which can be assured.

The first three must be met in a secure and trusted system.
Nr four can provide evidence of assurance.
Nr five engenders trust by assuring the OS meets the requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a security kernel?

A

A combination of hardware and software that implements a reference monitor. An early example of a RVM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a trusted computing base?

A

The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.

It consists of all protection mechanisms within a computer system that are responsible for enforcing a security policy.

One or more components that together enforce the security policy. Its ability to enforce the policy depend on the mechanisms and the correct input of parameters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a sandbox?

A

A virtual environment where we can run things as if they’re in a real environment, but very carefully in order to limit our processes. A VM that takes security into consideration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a VM?

A

An application that can simulate another environment. Not necessarily designed with security in mind. There are malware that can detect if they are being run in a VM or not and that will act differently when that is the case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some techniques for evaluating the assurance of a system?

A

Informal: Uses natural languages. Minimum rigor on processes.

Semi-formal: Uses natural languages. Uses specific methods with some rigor. Attempts to mimic formal.

Formal: Mathematics and other machine-parsable languages with tools and rigorous techniques like formal proofs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a trusted system?

A

A system that has been shown to meet well defined requirements through evaluation by credible experts who are certified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the common criteria?

A

A framework to establish the level of trust a system has by providing evidence of the security of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does assurance look like throughout the life cycle of a system, what different types of assurances are there?

A

Policy: the evidence that the set of requirements in the policy is complete, consistent and technically sound.

Design: the evidence that the design is sufficient to meet the requirements.

Implementation: the evidence that the implementation is consistent with the requirements. Can be done with testing, proof of correctness and vulnerability assessment.

Operational/administrative: the evidence that it sustains the security policy requirements during installation, configuration and day-to-day operation.

It is an iterative process and in practice the steps are dependent on the evidence of the previous step.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are 9 problem sources in computer systems according to Neumann?

A
  1. Requirements
  2. System design flaws
  3. Hardware implementation flaws
  4. Software implementation errors, bugs
  5. System use and operation errors and inadvertent mistakes
  6. Willful system misuse
  7. Malfunction
  8. Environmental problems, natural causes
  9. Evolution, maintenance, faulty upgrades, and decommissions