Lecture 14 - Security Flashcards

1
Q

What is the difference between protection and security?

A

Protection: control access of resources to processes

Enforces security policies

Security: Prevents unauthorised access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 5 broad objectives does security aim to provide?

A

Confidentiality- prevent unauthorised access

Integrity - ensure data has not been modified

Availability - ensure system is accessible

Accountability - know who did what

Authentication - authenticate each user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a protection domain?

A

Defines the objects a process may access and how it may access them

E.g. in domain 1 File1 has [R] access, but in domain two (another process) it might have [RW] access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a protection/access matrix work?

A

Domains down left side files at top

Permissions in intersecting squares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can an access matrix be compressed?

A

Associate permissions with each object: access control list

Associate permissions with each domain: capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are access control lists done on UNIX?

A

Process permission is specified by the owner of the process

Each file has entry in the list

Each entry has access rights for each owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In UNIX what 3 domains are ACLs defined for?

A

File owner

Group

Everyone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a capability?

A

Each process has a list of capabilities i.e. access rights to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is faking of capabilities prevented?

A

Cryptographic techniques to encode what each capability allows - can’t impersonate because don’t know how the capability was encoded

Capability lists are privileged instructions

Rely on hardware features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is revocation of access rights easier in Access Lists than Capability Lists?

A

Access list - simply delete the rights

Capability - have to find the process and its list before the right can be deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between discretionary access control and mandatory access control?

A

Discretionary: each object has an owner, usually creator, who controls the access rights

Mandatory: creator is not owner, and does not control access rights, they are defined by a security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 3 forms of authentication?

A

Something you know - password

Something you have - key card

Something you are - biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is bell-la padula multilevel security model?

A

Processes and objects have a security level

Process at level k can only read objects at level k or lower and write at level k or higher

Prevents higher level info leaking to lower levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Biba multilevel integrity model?

A

Processes and objects have security level

Process can write only objects at its level or lower

Can read only at its level or higher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can covert channels be used to communicate?

A

Send data using side effects

e.g. file locking or allocating resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a trojan horse/

A

Program that does bad stuff when it is let in

17
Q

what is a trap door?

A

Program that does bad stuff when exsecuted with particular data or password

18
Q

What is a logic bomb?

A

Program that does bad stuff under certain circumstances

19
Q

what is a virus?

A

Program that embeds itself into another program to reproduce and cause harm

20
Q

What is stack smashing/buffer overflow?

A

When program reads data into a buffer but does not check size

Data overflows and contains instructions which are then executed