Ch.14 Flashcards

(17 cards)

1
Q

Goals of protection

A

Each object is accessed correctly and inky by those processes that are allowed to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does UNIX handle domain switching(3):

A

Via file system ( setuid)

Via passwords (su)

Via commands (sudo)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Multics benefits

A
  • provides better granularity than simple user/kernel models
  • organized in hierarchical rings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multics limitations

A
  • doesn’t allow strict need to know
  • more complex, causes performance overhead
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to implement an access matrix

A

Option 1- global table

Option 2- access lists for objects

Option 3- capability list a for domains

Option 4- lock key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dynamic ( principles of protection )

A

Domain switching

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a domain

A

Set of access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access matrix design separates —— from ——-

A

Mechanism( how protection is enforced)

FROM

policy( what protection rules to enforce)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access matrix design doesn’t solve what problem ?

A

General confinement problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Issues of global table

A

Large

Difficult to group objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advantages of access lists of objects

A

Easily extended to contain default set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Lock key ( components )

A

Locks —> objects

Keys —> domains

Access rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Comparison of implementation

A

Global table; simple, but large

Access list: user centric, but slow

Capability list: process centric, but hard to revoke rights

Lock key: effective and flexible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key features of hydras capability system

A

Auxiliary rights

Capability requirement

Rights amplification

User defined rights

Procedural access

Solves mutual distrust

Security library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Process isolation key points

A

Prevents unauthorized access

Implemented using virtual address spaces

Limited or no inter process communication (IPC)

17
Q

OS that implement process isolation via separate address spaces(3):

A
  • UNIX like systems( Linux macOS Solaris)

VMS( virtual memory system)

Windows NT