ELEC 377 Flashcards
(53 cards)
What are the 4 security levels
1) Physical
2) Human
3) Network
4) OS
Which two security levels are outside of OS control
1) Physical
2) Human
What are 3 methods to implement physical security
1) Bios Password
2) Drive encryption (Can be device level or OS level)
3) Limit who has access to hardware
What are some common Human Security attacks
Password Resets
Phishing
Baiting (Free hardware or software that contains viruses)
Tech Support callbacks
Fake services
What is the CIA of system security
C - Confidentiality
I - Integrity
A - Availability
What are confidentiality issues in system security
Issues that stem from data problems, such as unauthorized disclosure of data, personal information, corporate R&D, financials or government information
What are integrity issues in system security
Modification of data such as balances on a credit card, or system modification, such as backdoor servers or software
What are availability issues in system security
Unauthorized use (leads to loss of CPU cycles)
Denial of service, or a change of password
Describe: Encryption at rest
Data in long term memory ie on a disk or hard drive is encrypted, and only decrypted when in use.
What is application security
Security regarding applications a user installs. Applications may be vulnerable, or may be malicious. These attacks can be prevented by encryption at rest
Security is?
Pervasive. Needs to be taken seriously by entire organization, or vulnerabilities will arise.
What is a stack overflow attack
Binary code is written into a buffer, overwriting the return address to point to the buffer, executing that code
What is the two types of Call/Return
intel/PPC/ZOS - Push return address to stack
ARM/NIOS - store return address in link register. If there are nested calls then push return address to stack
What is a real life example of Stack Overflow attack mentioned in class
BMP attack - stack overflow attack on images
How can we protect against stack overflow
Address Randomization - Logical address of data segment and stack segment change each time the process runs
Executability - Make stack pages not executable
Canary Values - Insert values into stack. If those values have been modified when exiting code we know an error is caused and terminate process
Canary Values
Usually compiler generated. Random value is provided by OS and read into a global value during process startup
What does the Device Driver Interface do?
It presents the devices connected to the programs. Devices are usually abstracted into different class such as SATA or SCSI drives.
What are the two main types of devices discussed in class
1) Character Devices - Move data 1 byte at a time. Mouse, keyboard Modems
2) Block devices - Devices where the minimum unit of transfer is a block. Discs, tapes, network interfaces
What does the /dev directory do
The /dev directory stores device files. Device files can only be created by root. Note that in unix everything is masked as a file
How are files in /dev setup
inode attributes specify the device. There are no data blocks. Major and minor numbers are used to specify drivers and specific devices respectively.
How do Character Device Drivers work
Major numbers connect the device to the driver. There can be multiple files with the same major number and the same or different minors. A process reads and writes to/from the device by reading & writing to/from the device file.
What is the concept of informational security
Informational security is the idea that individual pieces of information reveal nothing, but collectively they reveal private information.
What are some ways informational attacks take place
1) Carefully crafted queries. Asking a specific question that seems harmless but reveals information that may be important.
2) Traffic analysis
What is authentication as discussed in class.
The question of ensuring the person trying to access information or a system is the person they are saying they are.