Protection and Security Flashcards

1
Q

The OS manages a collection of ________ and _______

A

hardware, software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hardware-wise, the OS manages…

A

CPU, memory segments, disks, printer, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software-wise, the OS manages…

A

files, semaphores, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Each object the OS manages can be accessed through a set of ________

A

operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The OS needs to ensure each object is accessed _________ and only by those with the proper __________

A

correctly, permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Least Privilege Principle?

A

Programs, users and systems should be given just enough privileges to perform their tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Need to Know Principle?

A

At any time, a process should be able to access only those resources that it currently requires to complete its task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______ decide what will be done

A

policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mechanisms determine _____ something will be done

A

how

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A domain in this context refers to a set of _____ ______

A

access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A process operates within a ________ _______

A

protection domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A right-set is a subset of all the ______ ________ that can be performed on the object

A

valid operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Processes can switch from one ______ to another to access objects or perform needed operations

A

domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In static association, processes remains in their domains ________

A

forever

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which principle is difficult to maintain using static association?

A

Need-to-know principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In dynamic association, processes can switch ______

A

domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the 3 levels of domains?

A
  • User
  • Process
  • Procedure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In user domains, access depends on _______ and domain switching is the same as user ________

A

userID, switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In process domains, access depends on _______ and domain switching is the same as ______ ________

A

processID, message passing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In procedure domains, access depends on _______ _________ and domain switching is the same as _______ calls

A

local variables, procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

We can view protection as an _______ matrix

A

access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In an access matrix, rows represent _______ and coloumns represent ________

A

domains, objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Entries in the access matrix define the set of ________ that a process executing in domain i can invoke on object j

A

operations

24
Q

To incorporate domain switching in our access matrix, we consider domains as _____ and add a _______ right to them

A

objects, switch

25
Q

The entries of the access matrix are ________

A

dynamic

26
Q

what are 3 special access right we can give in the access matrix?

A
  • Copy access right R on object Oi (R*)
  • Owner of object Oi
  • Control of domain Di
27
Q

The access matrix separates _________ from _______

A

mechanism, policy

28
Q

What are three methods of implementing access matrices?

A
  • Global Table
  • Access Control List (ACL)
  • Capability List
29
Q

In a global table access matrix, the matrix is large and _______

A

sparse

30
Q

In an ACL access matrix, each coloumn has a list of _______ that can access it and what type of access

A

domains

31
Q

In an ACL access matrix it is difficult to determine _______ _____ of a domain

A

access rights

32
Q

In a capability list access matrix, each row has a list of objects and what __________ are allowed on them

A

operations

33
Q

What is a con of the capability list access matrix?

A

It is difficult to revoke capabilities of an object

34
Q

Revoking access rights is easy with _________ ________ _______

A

access control lists

35
Q

What are 4 schemes to implement access right revocation?

A
  • Back-pointers
  • Indirection
  • Requisition
  • Keys
36
Q

In the back pointer revocation scheme, pointers are maintained with object to ___________

A

capabilities

37
Q

In the indirection revocation scheme, capabilities point to an entry in a _______ ______ and requires a search to be deleted

A

global table

38
Q

In the _________ revocation scheme, the OS periodically deletes capabilities from each domain

A

requisition

39
Q

In the key revocation scheme, capabilities are copies of master ______ and revocation is done how?

A

keys. Changing the master key

40
Q

______ ______ _____ can be time-consuming to search

A

Access control lists

41
Q

What 3 classes does UNIX has to condense ACLs?

A
  • Owner
  • Group
  • Universe
42
Q

____ bits are used for each file to provide UNIX class protections. It’s format is _________

A

nine, rwx rwx rwx

43
Q

What does chmod 775 filename do to the 9 bits in filename?

A

111 101 001

44
Q

What does the protection bit r denote?

A

can list files

45
Q

The protection bit _ can open files

A

x

46
Q

Some systems like Solaris and Linux implement protection bits by _______ for all files

A

default

47
Q

What does the UNIX command setfacl do?

A

Set file access control list

48
Q

A user in one ______ may need to execute commands allowed only in another _______

A

domain, domain

49
Q

________ ________ allows any user to execute a file with the same privileges as the owner of the file.

A

Domain switching

50
Q

Domain switching is managed with the _______ bit

A

setuid

51
Q

What are 5 areas of security concerns?

A
  • Breach of confidentiality
  • Breach of integrity
  • Breach of availability
  • Theft of service
  • Denial of service
52
Q

What are 4 protection levels?

A
  • Physical
  • Human
  • Operating system
  • Network
53
Q

A trojan horse is when a program executes in other restricted ______

A

domains

54
Q

What is a trap door?

A

Designer of program leaves a secret hole

55
Q

A logic bomb initiates attacks under special ___________

A

circumstances

56
Q

A ______ is self-replicating and relies on a trojan horse to enter a system

A

virus

57
Q

A buffer overflow attempts to access ________ memory

A

illegal