os security intro Flashcards
what is os security
measures and mechanisms implemented to protect the os from threats vulnerabilities and unauthorised access
what is access control
controlling the resources that a user can access based on authentication and authorization
authentication
verifying the identity of a user
authorization
granting and restricting access based on the users roles and permissions
what is the active entity
the subject
user/process
what is the passive entitiy
the object
the file/resource
discretionary access control
the owner of the resource decided who is allowed access
mandatory access control
a system-wide policy decides who is allowed access
what are user identifiers
unique numbers assigned to users to identify and manage their access
what are the five types of user identifiers
user id uid
group id gid
effective uid euid
real uid ruid
saved uid suid
uid
assigned to each user
what is the uid of the root and why is this special
0
gives unrestricted access to the system
gid
assigned to a group of users
what are two benefits of gid
more effective as you dont need to configure permissions for each user
easier to modify permissions for the group rather than each user separately
euid
determines permissions for processes
ruid
the uid of the user who started the process
suid
allows a process to switch back to privileged uid after temporarily dropping privileges
nobody uid
massive number
used for running untrusted processes so it has minimal priveleges
how does assigning uid work
when a user logs in the system designs their uid and guid and all the files and processes created by them have the same uid and gid
when they attempt to access a resource the permissions are checked against their uid and gid
what are two of the potential threats with access control
privilege escalation
uid reuse
how is uid reuse a potential threat in access control
reassigning the uid to a new user may mean that they still have the same privileges of the old user
how is privilege escalation a potential threat in access control
hackers can exploit a misconfigured uid to gain privileges
what is file system security
protecting files and directories via permissions and encrypting sensitive data to avoid unauthorised access
what are the three parts of file permissions (+ explain them)
ownership: all owned by a specific user/group that decide the permissions
permission types (r, w, x)
levels: user(owner) , group, others