OS Security Flashcards

1
Q

Define

Access Control

A

Selective restriction of access to resource according to policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define

Subject/Principal

OS Security

A

Entity accessing the resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define

Object

OS Security

A

Resource being accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define

Policy

OS Security

A

Rules on how a subject can/can’t access an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define

Authorization

OS Security

A

Who/what should perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define

Authentication

OS Security

A

Identifying who is requesting to access a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define

Audit

OS Security

A

Log of all actions from a principal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the 5 A’s of OS Security

A

Authorization, Authentication, Audit, Accountability, Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe

Access Control Matrix

OS Security

A

Manages policies where the rows are the subject(s) and the columns are the object(s), making the cells the permission granted (T/F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe

Permissions

OS Security

A

Finer-grained access enforced by Access Control List (ACL) and Capability-Based Security (CBS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe

Access Control List (ACL)

OS Security

A

Each object’s ACL is defined per subject (object-centric mechanism)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provide an analogy for an Access Control List (ACL)

OS Security

A

Guest/VIP list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe

Capability-Based Security

OS Security

A

Each subject has a token to access an object (subject-centric mechanism)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Provide an analogy for Capability-Based Security (CBS)

OS Security

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Trusted Computer Base?

OS Security

A

A reference monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

With Discretionary Access Control, who sets the access control policy ?

OS Security

A

Object owners set for their own objects

17
Q

With Mandatory Access Control, who sets the access control policy?

OS Security

A

A centralized authority

18
Q

Describe

Attribute Based Access Control

OS Security

A

Assigns attributes to subjects and/or objects to reinforce policies

19
Q

What should happen to untrusted components?

OS Security

A

Untrusted components should be isolated with least privilege

20
Q

What should happen to trusted components?

OS Security

A

Trusted components should be in a separated area