Lecture 14 - Security Flashcards

1
Q

What 5 broad objectives does security aim to provide?

A

Confidentiality - prevent unauthorized access

Integrity - ensure data has not been modified

Availability - ensure the system is accessible

Accountability - know who did what

Authentication - authenticate each user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a protection domain?

A

A protection domain specifies the resources that a process may access.

A domain is defined as a set of < object, { access right set } > pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a protection/access matrix work?

A

The rows of the matrix represent domains and columns represent files.

Each cell of the matrix represents a set of access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can an access matrix be compressed?

A

By columns:

Associate permissions with each object: access control list

By rows:

Associate permissions with each domain: capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In UNIX what 3 domains are ACLs defined for?

A

File owner

Group

Everyone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is a revocation of access rights easier in Access Lists than Capability Lists?

A

Access list - simply delete the rights

Capability - have to find the process and its list before the right can be deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between discretionary access control and mandatory access control?

A

Discretionary: each object has an owner, usually creator, who controls the access rights

Mandatory: creator is not owner, and does not control access rights, they are defined by a security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 3 forms of authentication?

A

Something you know - password

Something you have - key card

Something you are - biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is stack smashing/buffer overflow?

A

When program reads data into a buffer but does not check size

Data overflows and contains instructions which are then executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly